- Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations.
- A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework.
- Biosignal Authentication Considered Harmful Today.
- Falsification using Reachability of Surrogate Koopman Models.
- ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation.
- A Study of the Effects of Transfer Learning on Adversarial Robustness.
- Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms.
- Confine: Fine-grained system call filtering for container attack surface reduction.
- Improving Storage Systems Using Machine Learning.
- Verifiable Sustainability in Data Centers.
- Multi-Agent Spatial Predictive Control with Application to Drone Flocking.
- Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
- Role Models: Role-based Debloating for Web Applications.
- MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
- Integrating Logic Rules with Everything Else, Seamlessly.