All Stories

  1. Program-mandering
  2. Block Oriented Programming
  3. Long-Span Program Behavior Modeling and Attack Detection
  4. PtrSplit
  5. Taming the Costs of Trustworthy Provenance through Policy Reduction
  6. GRIFFIN
  7. GRIFFIN
  8. Challenges in Making Access Control Sensitive to the "Right" Contexts