All Stories

  1. Poster: A Multi-step Approach for Classification of Malware Samples
  2. Using DNS Patterns for Automated Cyber Threat Attribution
  3. Automatically finding execution scenarios to deploy security-sensitive workflows
  4. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes