- Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations.
- A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework.
- Taking off the Rose-Tinted Glasses: A Critical Look at Adversarial ML Through the Lens of Evasion Attacks.
- Biosignal Authentication Considered Harmful Today.
- Falsification using Reachability of Surrogate Koopman Models.
- Security Analysis of RL-Based Artificial Pancreas Systems.
- State Machine Mutation-based Testing Framework for Wireless Communication Protocols.
- ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation.
- A Study of the Effects of Transfer Learning on Adversarial Robustness.
- Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms.
- Confine: Fine-grained system call filtering for container attack surface reduction.
- Improving Storage Systems Using Machine Learning.
- Verifiable Sustainability in Data Centers.
- Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
- MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.