Holmes: real-time apt detection through correlation of suspicious information flows SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan 2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019 | 417 | 2019 |
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ... 26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017 | 214 | 2017 |
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 171 | 2019 |
{NAVEX}: Precise and scalable exploit generation for dynamic web applications A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan 27th USENIX Security Symposium (USENIX Security 18), 377-392, 2018 | 80 | 2018 |
Extractor: Extracting attack behavior from threat reports K Satvat, R Gjomemo, VN Venkatakrishnan 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 598-615, 2021 | 69 | 2021 |
Chainsaw: Chained automated workflow-based exploit generation A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 49 | 2016 |
A location aware role and attribute based access control system IF Cruz, R Gjomemo, B Lin, M Orsini Proceedings of the 16th ACM SIGSPATIAL international conference on Advances …, 2008 | 30 | 2008 |
A constraint and attribute based security framework for dynamic role assignment in collaborative environments IF Cruz, R Gjomemo, B Lin, M Orsini International Conference on Collaborative Computing: Networking …, 2008 | 28 | 2008 |
Propatrol: Attack investigation via extracted high-level tasks S M. Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan Information Systems Security: 14th International Conference, ICISS 2018 …, 2018 | 26 | 2018 |
Educational design research for the development of a collectible card game for cybersecurity learning MK Thomas, A Shyjka, S Kumm, R Gjomemo Journal of Formative Design in Learning 3, 27-38, 2019 | 17 | 2019 |
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective M Asiri, N Saxena, R Gjomemo, P Burnap ACM transactions on cyber-physical systems 7 (2), 1-33, 2023 | 13 | 2023 |
From verification to optimizations R Gjomemo, KS Namjoshi, PH Phung, VN Venkatakrishnan, LD Zuck Verification, Model Checking, and Abstract Interpretation: 16th …, 2015 | 13 | 2015 |
Digital check forgery attacks on client check truncation systems R Gjomemo, H Malik, N Sumb, VN Venkatakrishnan, R Ansari International conference on financial cryptography and data security, 3-20, 2014 | 13 | 2014 |
Static detection and automatic exploitation of intent message vulnerabilities in Android applications D Gallingani Politecnico di Milano, 2012 | 12 | 2012 |
Attack analysis results for adversarial engagement 1 of the darpa transparent computing program B Eshete, R Gjomemo, MN Hossain, S Momeni, R Sekar, S Stoller, ... arXiv preprint arXiv:1610.06936, 2016 | 9 | 2016 |
Practical exploit generation for intent message vulnerabilities in android D Gallingani, R Gjomemo, VN Venkatakrishnan, S Zanero Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 9 | 2015 |
An interoperation framework for secure collaboration among organizations IF Cruz, R Gjomemo, G Jarzab Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010 | 8 | 2010 |
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao 2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023 | 7 | 2023 |
Leveraging static analysis tools for improving usability of memory error sanitization compilers R Gjomemo, PH Phung, E Ballou, KS Namjoshi, VN Venkatakrishnan, ... 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 6 | 2016 |
A secure mediator for integrating multiple level access control policies IF Cruz, R Gjomemo, M Orsini International Conference on Knowledge-Based and Intelligent Information and …, 2008 | 5 | 2008 |