Publications
20+ peer-reviewed publications in top security, software engineering, and systems venues. Includes 2 best paper awards and 2 US patents.
2025
- An empirical evaluation of pre-trained large language models for repairing declarative formal specificationsEmpirical Software Engineering, 2025
- Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair ApproachesIn 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2025
2024
- DepsRAG: Towards Agentic Reasoning and Planning for Software Dependency ManagementIn NeurIPS 2024 Workshop on Open-World Agents (OWA), 2024
- Machine Learning Systems are Bloated and VulnerableProceedings of the ACM on Measurement and Analysis of Computing Systems, 2024
- SoK: Software Debloating Landscape and Future DirectionsIn Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation (FEAST), 2024
- Software Debloating from Exception-Handler LensesIn Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation (FEAST), 2024
2022
- Lightweight, Multi-Stage, Compiler-Assisted Application SpecializationIn 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 2022
- Robust Learning against Relational AdversariesIn Advances in Neural Information Processing Systems (NeurIPS), 2022
- Practical Data Access Minimization in Trigger-Action PlatformsIn 31st USENIX Security Symposium (USENIX Security 22), 2022
- autoMPI: Automated Multiple Perspective Attack Investigation with Semantics Aware Execution PartitioningIEEE Transactions on Software Engineering, 2022
- IoTCOM: Dissecting Interaction Threats in IoT SystemsIEEE Transactions on Software Engineering, 2022
2020
- Scalable Analysis of Interaction Threats in IoT SystemsIn Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2020
- DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded CodeIEEE Transactions on Information Forensics and Security, 2020
- Comparing Formal Models of IoT App Coordination AnalysisIn Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, 2020
2019
- Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded CodeIn IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 2019
2018
- Efficient Signature Generation for Classifying Cross-Architecture IoT MalwareIn 2018 IEEE Conference on Communications and Network Security (CNS), 2018
- Towards Best Secure Coding Practice for Implementing SSL/TLSIn IEEE INFOCOM 2018 Workshops, 2018
- Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud ProvidersFuture Generation Computer Systems, 2018
2017
- Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust FactorsIEEE Cloud Computing, 2017
2016
-
- Boosting Usability for Protecting Online Banking Applications Against APTsIn 2016 Cybersecurity and Cyberforensics Conference (CCC), 2016
- Breast Cancer Detection Using K-Nearest Neighbor Machine Learning AlgorithmIn 2016 9th International Conference on Developments in eSystems Engineering (DeSE), 2016