- RøB: Ransomware over Modern Web Browsers [USENIX Security'23]
- Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction [CCS'22]
- Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection [CCS'22]
- Wake Up Digital Forensics’ Community and Help Combat Ransomware [IEEE Symposium on Security and Privacy'22]
- TEE-aided Write Protection Against Privileged Data Tampering [NDSS'19]
- The aftermath of a crypto-ransomware attack at a large academic institution [USENIX Security'18]
- Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? [IEEE Symposium on Security and Privacy'18]
- A Storage-level Detection Mechanism against Crypto-Ransomware [CCS'18]
- Tracking Ransomware End-to-end [IEEE Symposium on Security and Privacy'18]
- UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware [USENIX Security'16]
- Humans vs. Machines in Malware Classification [USENIX Security '23]
- FCGAT: Interpretable Malware Classification Method using Function Call Graph and Attention Mechanism [NDSS'23]
- Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection [CCS'22]
- Forecasting Malware Capabilities From Cyber Attack Memory Images [USENIX Security'21]
- When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World [USENIX Security'21]
- Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection [NDSS'21]
- DeepReflect: Discovering Malicious Functionality through Binary Reconstruction [USENIX Security'21]
- You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis [NDSS'20]
- Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem [NDSS'20]
- When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features [NDSS'20]
- ExSpectre: Hiding Malware in Speculative Execution [NDSS'19]
- Cross Container Attacks: The Bewildered eBPF on Clouds [USENIX Security'23]
- Electrode: Accelerating Distributed Protocols with eBPF [NSDI'23]
- Comparing Security in eBPF and WebAssembly [eBPF'23]
- Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee [eBPF'23]
- Enabling BPF Runtime policies for better BPF management [eBPF'23]
- Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF [eBPF'23]
- RingGuard: Guard io_uring with eBPF [eBPF'23]
- Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing [eBPF'23]
- Practical and Flexible Kernel CFI Enforcement using eBPF [eBPF'23]
- XRP: In-Kernel Storage Functions with eBPF [OSDI'22]
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary [NDSS'19]