@inproceedings {277206, author = {Octavian Suciu and Connor Nelson and Zhuoer Lyu and Tiffany Bao and Tudor Dumitras}, title = {Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits}, booktitle = {31st USENIX Security Symposium (USENIX Security 22)}, year = {2022}, isbn = {978-1-939133-31-1}, address = {Boston, MA}, pages = {377--394}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/suciu}, publisher = {USENIX Association}, month = aug } @inproceedings {274687, author = {Erin Avllazagaj and Ziyun Zhu and Leyla Bilge and Davide Balzarotti and Tudor Dumitras}, title = {When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World}, booktitle = {30th USENIX Security Symposium (USENIX Security 21)}, year = {2021}, isbn = {978-1-939133-24-3}, pages = {3487--3504}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/avllazagaj}, publisher = {USENIX Association}, month = aug } @inproceedings {236248, author = {Sanghyun Hong and Pietro Frigo and Yigitcan Kaya and Cristiano Giuffrida and Tudor Dumitras}, title = {Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks}, booktitle = {28th USENIX Security Symposium (USENIX Security 19)}, year = {2019}, isbn = {978-1-939133-06-9}, address = {Santa Clara, CA}, pages = {497--514}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/hong}, publisher = {USENIX Association}, month = aug } @inproceedings {217460, author = {Doowon Kim and Bum Jun Kwon and Kristi{\'a}n Koz{\'a}k and Christopher Gates and Tudor Dumitras}, title = {The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing} {PKI}}, booktitle = {27th USENIX Security Symposium (USENIX Security 18)}, year = {2018}, isbn = {978-1-939133-04-5}, address = {Baltimore, MD}, pages = {851--868}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/kim}, publisher = {USENIX Association}, month = aug } @inproceedings {217571, author = {Chaowei Xiao and Armin Sarabi and Yang Liu and Bo Li and Mingyan Liu and Tudor Dumitras}, title = {From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild}, booktitle = {27th USENIX Security Symposium (USENIX Security 18)}, year = {2018}, isbn = {978-1-939133-04-5}, address = {Baltimore, MD}, pages = {903--918}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/xiao}, publisher = {USENIX Association}, month = aug } @inproceedings {216833, author = {Sanghyun Hong and Abhinav Srivastava and William Shambrook and Tudor Dumitras}, title = {Go Serverless: Securing Cloud via Serverless Design Patterns}, booktitle = {10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18)}, year = {2018}, address = {Boston, MA}, url = {https://www.usenix.org/conference/hotcloud18/presentation/hong}, publisher = {USENIX Association}, month = jul } @inproceedings {217486, author = {Octavian Suciu and Radu Marginean and Yigitcan Kaya and Hal Daume III and Tudor Dumitras}, title = {When Does Machine Learning {FAIL}? Generalized Transferability for Evasion and Poisoning Attacks}, booktitle = {27th USENIX Security Symposium (USENIX Security 18)}, year = {2018}, isbn = {978-1-939133-04-5}, address = {Baltimore, MD}, pages = {1299--1316}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/suciu}, publisher = {USENIX Association}, month = aug } @inproceedings {191006, author = {Carl Sabottke and Octavian Suciu and Tudor Dumitras}, title = {Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting {Real-World} Exploits}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, year = {2015}, isbn = {978-1-939133-11-3}, address = {Washington, D.C.}, pages = {1041--1056}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottke}, publisher = {USENIX Association}, month = aug } @inproceedings {181312, author = {Tudor Dumitras and Petros Efstathopoulos}, title = {Ask {WINE}: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis}, booktitle = {5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12)}, year = {2012}, address = {San Jose, CA}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/dumitras}, publisher = {USENIX Association}, month = apr } @inproceedings {266604, author = {Tudor Dumitras and Iulian Neamtiu}, title = {Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware}, booktitle = {4th Workshop on Cyber Security Experimentation and Test (CSET 11)}, year = {2011}, address = {San Francisco, CA}, url = {https://www.usenix.org/conference/cset11/experimental-challenges-cyber-security-story-provenance-and-lineage-malware}, publisher = {USENIX Association}, month = aug }