Publications in systems, system security and cyber experimentation
Kernel Auditing using Augmented Reference Behavior Analysis and Virtualized Selective Tracing.
In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.
Signals and Symptoms: ICS Attack Dataset from Railway Cyber Range.
In the 11th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems, 2025.
Erebor: A Drop-In Sandbox Solution for Private Data Processing in Untrusted Confidential Virtual Machines.
In European Conference on Computer Systems (EuroSys), 2025.
Scrutinizer: Towards Secure Forensics on Compromised TrustZone.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
In the 32nd Annual Network and Distributed System Security Symposium (NDSS), 2025.
From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON.
In Workshop on SOC Operations and Construction (WOSOC) 2025, 2025.
VulZoo: A Comprehensive Vulnerability Intelligence Dataset (Tool Demonstration Track).
In the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2024.
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024.
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2024.
Best Practical Paper AwardPalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
In the 17th ACM ASIA Conference on Computer and Communications Security (CCS), 2022.
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
In the 27th European Symposium on Research in Computer Security (ESORICS), 2022.
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records.
In the 2022 IEEE Symposium on Security and Privacy (S&P), 2022.
Watson: Abstracting Behaviors from Audit logs via Aggregation of Contextual Semantics.
In the 28th Annual Network and Distributed System Security Symposium (NDSS), 2021.
Robust P2P Primitives Using SGX Enclaves.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2020.
Enabling Practical Experimentation in Cyber-security Training.
In International Conference on Dependable Systems and Communications (DSC), 2017.
DroidVault: A Trusted Data Vault for Android Devices.
In the 19th International Conference on Engineering of Complex Computer Systems (ICECCS), 2014.
Best Paper AwardAirBag: Boosting Smartphone Resistance to Malware Infection.
In the 21st Network & Distributed System Security Symposium (NDSS), 2014.
Enforcing system-wide control flow integrity for exploit detection and diagnosis.
In the 8th ACM SIGSAC symposium on Information, computer and communications security (AsiaCCS), 2013.