Malware detection using machine learning based analysis of virtual memory access patterns Z Xu, S Ray, P Subramanyan, S Malik Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017 | 143 | 2017 |
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn M Gallagher, L Biernacki, S Chen, ZB Aweke, SF Yitbarek, MT Aga, ... Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 92 | 2019 |
Software-driven security attacks: From vulnerability sources to durable hardware defenses L Biernacki, M Gallagher, Z Xu, MT Aga, A Harris, S Wei, M Tiwari, ... ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-38, 2021 | 5 | 2021 |
Trace-based Analysis of Memory Corruption Malware Attacks Z Xu, A Gupta, S Malik Hardware and Software: Verification and Testing: 13th International Haifa …, 2017 | 4 | 2017 |
Analyzing privilege escalation risks using a multi-layer reasoning framework M Li, V Gori, Z Xu, N Razavi, O Tkachuk US Patent 12,164,652, 2024 | | 2024 |
Specification language for generating graph reachability-based analyses for cloud-based system resources N Razavi, O Tkachuk, XU Zhixing, S Nejati, M Li US Patent 12,132,735, 2024 | | 2024 |
Cloud resource protection via automated security property reasoning Z Xu, S Guo, O Tkachuk, S Nejati, N Razavi, G Argyros 2024 39th IEEE/ACM International Conference on Automated Software …, 2024 | | 2024 |