Bypassing memory safety mechanisms through speculative control flow hijacksAndrea MambrettiAlexandra Sandulescuet al.2021EuroS&P 2021
TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public CloudsWojciech OzgaDo Le Quocet al.2021CLOUD 2021
NL2Vul: Natural Language to Standard Vulnerability Score for Cloud Security Posture ManagementMuhammed Fatih BulutJinho Hwang2021CLOUD 2021
GhostBuster: Understanding and overcoming the pitfalls of transient execution vulnerability checkersAndrea MambrettiPasquale Convertiniet al.2021SANER 2021
Microservice-Aware Reference Monitoring through Hybrid Program AnalysisWilliam BlairFred Araujoet al.2021FloCon 2021
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New BugsSanjeev DasKedrian Jameset al.2020ACSAC 2020
Unleashing Cyber Reasoning: DARPA Transparent Computing Threat Hunting RetrospectiveXiaokui Shu2020ACSAC 2020
Universal Composition with Global Subroutines: Capturing Global Setup within plain UCChristian BadertscherRan Canettiet al.2020TCC 2020