Publications

Transparent Interpretation and Integration of Layered Software Architecture Even Streams
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis
Revisiting Client Puzzles for State Exhaustion Attacks Resilience
PowerAlert: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement
From high-level modeling toward efficient and trustworthy circuits
Accounting for the human user in predictive security models
A Game-Theoretic Approach to Respond to Attacker Lateral Movement
Model Checking Software with First Order Logic Specifications Using AIG Solvers
Reduction and Abstraction Techniques for BIP
Portable Parallel Programs using architecture-aware libraries