Capability-based memory isolation is a promising new architectural primi...
Graph neural networks offer a promising approach to supervised learning ...
A transpiler converts code from one programming language to another. Man...
Membership inference (MI) attacks highlight a privacy weakness in presen...
Classification tasks on labeled graph-structured data have many importan...
Exceptions are a commodity hardware functionality which is central to
mu...
Fault tolerance of a blockchain is often characterized by the fraction f...
Programming by Example (PBE) is a program synthesis paradigm in which th...
Analyzing structural properties of social networks, such as identifying ...
Enclaves, such as those enabled by Intel SGX, offer a hardware primitive...
We design and implement from scratch a new fuzzer called SIVO that refin...
Trusted-execution environments (TEE), like Intel SGX, isolate user-space...
Enclaves, such as those enabled by Intel SGX, offer a powerful hardware
...
Automatic patch generation can significantly reduce the window of exposu...
Idiomatic expressions have always been a bottleneck for language
compreh...
Contact tracing is an essential tool in containing infectious diseases s...
Verifying security properties of deep neural networks (DNNs) is becoming...
Neural networks are increasingly employed in safety-critical domains. Th...
In light of ever-increasing scale and sophistication of modern DDoS atta...
Blockchain protocols, originating from Bitcoin, have established a new m...
We investigate a family of bugs in blockchain-based smart contracts, whi...
Symbolic execution is a powerful technique for program analysis. However...
New trusted computing primitives such as Intel SGX have shown the feasib...
Smart contracts---stateful executable objects hosted on blockchains like...