The Circle of life: A {large-scale} study of the {IoT} malware lifecycle O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis 30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021 | 98 | 2021 |
Determining the number of clusters via iterative consensus clustering C Meyer, S Race, K Valakuzhy Proceedings of the 2013 SIAM International Conference on Data Mining, 94-102, 2013 | 38 | 2013 |
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ... 32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023 | 4 | 2023 |
On the feasibility of remotely triggered automotive hardware trojans A Moschos, K Valakuzhy, AD Keromytis 2022 International Conference on Electrical, Computer, Communications and …, 2022 | 3 | 2022 |
Crashtalk: Automated generation of precise, human readable, descriptions of software security bugs K James, K Valakuzhy, K Snow, F Monrose Proceedings of the Fourteenth ACM Conference on Data and Application …, 2024 | 2 | 2024 |
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned O Alrawi, MY Wong, A Avgetidis, K Valakuzhy, BV Adjibi, K Karakatsanis, ... arXiv preprint arXiv:2403.16304, 2024 | | 2024 |
Iterated Consensus Clustering: A Technique We Can All Agree On M Hong, R Pearce, K Valakuzhy, C Meyer, S Race Algorithms 5, 1, 0 | | |