USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Tudor Dumitras [Clear All Filters]
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. 31st USENIX Security Symposium (USENIX Security 22). :377--394.
.
2022. When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. 30th USENIX Security Symposium (USENIX Security 21). :3487--3504.
.
2021. Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. 28th USENIX Security Symposium (USENIX Security 19). :497--514.
.
2019. The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. 27th USENIX Security Symposium (USENIX Security 18). :851--868.
.
2018. From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild. 27th USENIX Security Symposium (USENIX Security 18). :903--918.
.
2018. Go Serverless: Securing Cloud via Serverless Design Patterns. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
.
2018. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks 27th USENIX Security Symposium (USENIX Security 18). :1299--1316.
.
2018. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. 24th USENIX Security Symposium (USENIX Security 15). :1041--1056.
.
2015. Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
.
2012. Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. 4th Workshop on Cyber Security Experimentation and Test (CSET 11).
.
2011.