{NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion A El-Hassany, P Tsankov, L Vanbever, M Vechev 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 116 | 2018 |
{NetHide}: Secure and practical network topology obfuscation R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev 27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018 | 90 | 2018 |
2018 IEEE Symposium on Security and Privacy T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ... | | |
Access control synthesis for physical spaces P Tsankov, MT Dashti, D Basin IEEE CSF 2016, 2016 | 13 | 2016 |
Access control with formal security guarantees P Tsankov ETH Zurich, 2016 | 1 | 2016 |
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ... IEEE Security and Privacy 2018, 2018 | 1042 | 2018 |
Automated discovery of adaptive attacks on adversarial defenses C Yao, P Bielik, P Tsankov, M Vechev Advances in Neural Information Processing Systems 34, 26858-26870, 2021 | 27 | 2021 |
Avoiding Robust Misclassifications for Improved Robustness without Accuracy Loss Y Merkli, P Bielik, P TSANKOV, M Vechev | | |
Bayonet: probabilistic inference for networks T Gehr, S Misailovic, P Tsankov, L Vanbever, P Wiesmann, M Vechev ACM SIGPLAN Notices 53 (4), 586-602, 2018 | 25 | 2018 |
Constructing mid-points for two-party asynchronous protocols P Tsankov, M Torabi-Dashti, D Basin Principles of Distributed Systems: 15th International Conference, OPODIS …, 2011 | 1 | 2011 |
Debin J He, P Ivanov, P Tsankov, V Raychev, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 1 | 2018 |
Debin: Predicting debug information in stripped binaries J He, P Ivanov, P Tsankov, V Raychev, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 131 | 2018 |
Decentralized composite access control P Tsankov, S Marinovic, MT Dashti, D Basin Principles of Security and Trust, 245-264, 2014 | 26 | 2014 |
DP-Finder B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 1 | 2018 |
Dp-finder: Finding differential privacy violations by sampling and optimization B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 72 | 2018 |
ERAN User Manual G Singh, M Balunovic, A Ruoss, C Müller, J Maurer, A Hoffmann, ... | | |
Execution hijacking: Improving dynamic analysis by flying off course P Tsankov, W Jin, A Orso, S Sinha IEEE ICST 2011, 2011 | 17 | 2011 |
Fail-Secure Access Control P Tsankov, S Marinovic, M Torabi Dashti, D Basin ACM CCS 2014, 1157-1168, 2014 | 8 | 2014 |
FASE: Functionality-Aware Security Enforcement P Tsankov, M Pistoia, O Tripp, M Vechev, P Ferrara ACM ACSAC 2016, 2016 | 2 | 2016 |
Force Open K Wst, P Tsankov, S Radomirovi, M Torabi Dashti Digital Investigation: The International Journal of Digital Forensics …, 2017 | | 2017 |