Follow
Kevin Valakuzhy
Kevin Valakuzhy
Verified email at gatech.edu
Title
Cited by
Cited by
Year
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
O Alrawi, C Lever, K Valakuzhy, K Snow, F Monrose, M Antonakakis
30th USENIX Security Symposium (USENIX Security 21), 3505-3522, 2021
982021
Determining the number of clusters via iterative consensus clustering
C Meyer, S Race, K Valakuzhy
Proceedings of the 2013 SIAM International Conference on Data Mining, 94-102, 2013
382013
Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators
A Avgetidis, O Alrawi, K Valakuzhy, C Lever, P Burbage, AD Keromytis, ...
32nd USENIX security symposium (USENIX Security 23), 5307-5324, 2023
42023
On the feasibility of remotely triggered automotive hardware trojans
A Moschos, K Valakuzhy, AD Keromytis
2022 International Conference on Electrical, Computer, Communications and …, 2022
32022
Crashtalk: Automated generation of precise, human readable, descriptions of software security bugs
K James, K Valakuzhy, K Snow, F Monrose
Proceedings of the Fourteenth ACM Conference on Data and Application …, 2024
22024
SoK: An Essential Guide For Using Malware Sandboxes In Security Applications: Challenges, Pitfalls, and Lessons Learned
O Alrawi, MY Wong, A Avgetidis, K Valakuzhy, BV Adjibi, K Karakatsanis, ...
arXiv preprint arXiv:2403.16304, 2024
2024
Iterated Consensus Clustering: A Technique We Can All Agree On
M Hong, R Pearce, K Valakuzhy, C Meyer, S Race
Algorithms 5, 1, 0
The system can't perform the operation now. Try again later.
Articles 1–7