![]() ![]() (A 2-minute demo and the conference presentation are also available.). IEEE Symposium on Security and Privacy ( IEEE S&P) May, 2020. Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics Md Nahid Hossain, Sanaz Sheikhi and R. Workshop on Forming an Ecosystem Around Software Transformation ( FEAST) November, 2020. On the Impact of Exception Handling Compatibility on Binary Instrumentation Soumyakant Priyadarshan, Huan Nguyen and R. SekarĪnnual Computer Security Applications Conference ( ACSAC) December, 2020. Practical Fine-Grained Binary Code Randomization Soumyakant Priyadarshan, Huan Nguyen and R. Undergraduate (Honors) Thesis ( Stony Brook University) January, 2021. ![]() ![]() On the Effectiveness of Cyber-Attack Campaign Investigation with Reduced Audit Logs Maggie Zhou Master's Thesis ( Stony Brook University) August, 2021. Efficient Audit Data Collection for Linux Rohit Aich PhD Dissertation ( Stony Brook University) January, 2022. Publications A New Tag-Based Approach for Real-Time Detection of Advanced Cyber Attacks Md Nahid Hossain ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |