New Perspectives on Adversarially Robust Machine Learning Systems
Chawin Sitawarin [2024]

Generative Models as a Robust Alternative for Image Classification: Progress and Challenges
An Ju [2021]

Privacy Controls for Always-Listening Devices
Nathan Malkin [2021]

Background and Occlusion Defenses Against Adversarial Examples and Adversarial Patches
Michael McCoyd [2020]

Thwarting Sophisticated Enterprise Attacks: Data-Driven Methods and Insights
Grant Ho [2020]

Evaluation and Design of Robust Neural Network Defenses
Nicholas Carlini [2018]

The Dark Net: De-Anonymization, Classification and Analysis
Rebecca Portnoff [2018]

Large-Scale Analysis of Modern Code Review Practices and Software Security in Open Source Software
Christopher Thompson [2017]

Towards Improved Mitigations for Two Attacks on Memory Safety
Thurston Dang [2017]

Improving Cloud Security using Secure Enclaves
Jethro Beekman [2016]

Helping Developers Construct Secure Mobile Applications
Erika Chin [2013]

Secure Virtualization with Formal Methods
Cynthia Sturton [2013]

Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities
Matthew Finifter [2013]

Language and Framework Support for Reviewably-Secure Software Systems
Adrian Mettler [2012]

Towards Comprehensible and Effective Permission Systems
Adrienne Porter Felt [2012]

Enabling More Meaningful Post-Election Investigations
Arel Lee Cordero [2010]

Dynamic Test Generation for Large Binary Programs
David Alexander Molnar [2009]

Human Factors in Web Authentication
Chris K. Karlof [2009]

Building Reliable Voting Machine Software
Ka-Ping Yee [2007]

Verifying Security Properties in Electronic Voting Machines
Naveen K. Sastry [2007]

Bridging the Gap Between People and Policies in Security and Privacy
Umesh Shankar [2006]

Verifying Security Properties using Type-Qualifier Inference
Robert Timothy Johnson [2006]

Efficient Filtering Support for High-Speed Network Intrusion Detection
Jose M. Gonzalez [2005]

Lightweight Model Checking for Improving Software Security
Hao Chen [2004]