Search for persons
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
1
SoK: A Tale of Reduction, Security, and Correctness - Evalu..:
, In:
?
2024 IEEE 40th International Conference on Data Engineering (ICDE) ,
2
Kondo: Efficient Provenance-Driven Data Debloating:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XVII ,
5
Analyzing Discrepancies in Whole-Network Provenance:
, In:
?
Proceedings of the 16th Cyber Security Experimentation and Test Workshop ,
7
Towards Reproducible Ransomware Analysis:
, In:
?
2023 IEEE Secure Development Conference (SecDev) ,
8
BLADE: Towards Scalable Source Code Debloating:
, In:
?
2022 IEEE International Conference on Cloud Engineering (IC2E) ,
11
PACED: Provenance-based Automated Container Escape Detectio:
, In:
?
2022 IEEE 29th International Conference on High Performance Computing, Data, and Analytics (HiPC) ,
13
Provenance-based Workflow Diagnostics Using Program Specifi..:
, In:
?
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering ,
15