- Improving Storage Systems Using Machine Learning.
- Credibility in Private Set Membership.
- WebSheets: A New Privacy-Centric Framework for Web Applications.
- Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning.
- Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
- Role Models: Role-based Debloating for Web Applications.
- MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
- The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript.
- Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs.
- Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
- Runtime-Assured, Real-Time Neural Control of Microgrids.
- An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
- Cloud Computing Security: Foundations and Research Directions.
- An Approach for Multi-Level Visibility Scoping of IoT Services in Enterprise Environments.
- Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets.