The NSI team publishes 6 more cool papers!

gfjgtubvxcbcNews

Thang Bui, Scott D. Stoller, and Jiajie Li,
Greedy and Evolutionary Algorithms for Mining Relationship-Based Access Control Policies. Computers & Security, 80:317-333, January 2019.

Thang Bui, Scott D. Stoller, and Jiajie Li,
Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. In Proceedings of the 11th International Symposium on Foundations & Practice of Security (FPS 2018), volume 11358 of Lecture Notes in Computer Science. Springer-Verlag, 2018.

Md. Nahid Hossain, Junao Wang, R. Sekar, and Scott D. Stoller,
Dependence-Preserving Data Compaction for Scalable Forensic Analysis. In Proceedings of the 27th USENIX Security Symposium. USENIX Association, 2018.

Dung Phan, Nicola Paoletti, Timothy Zhang, Radu Grosu, Scott A. Smolka, and Scott D. Stoller,
Neural State Classification for Hybrid Systems. In Proceedings of the 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Springer-Verlag, 2018.

Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, and Fabian Monrose,
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security, 40th IEEE Symposium on Security & Privacy (S&P). May 2019, San Francisco, CA.

Oleksii Starov, Pierre Laperdrix, Alexandros Kapravelos, and Nick Nikiforakis,
Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat, Proceedings of the Web Conference (WWW), 2019