关注
Petar Tsankov
Petar Tsankov
Co-founder & CEO, LatticeFlow
在 latticeflow.ai 的电子邮件经过验证 - 首页
标题
引用次数
年份
{NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion
A El-Hassany, P Tsankov, L Vanbever, M Vechev
15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018
1162018
{NetHide}: Secure and practical network topology obfuscation
R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev
27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018
902018
2018 IEEE Symposium on Security and Privacy
T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ...
Access control synthesis for physical spaces
P Tsankov, MT Dashti, D Basin
IEEE CSF 2016, 2016
132016
Access control with formal security guarantees
P Tsankov
ETH Zurich, 2016
12016
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ...
IEEE Security and Privacy 2018, 2018
10422018
Automated discovery of adaptive attacks on adversarial defenses
C Yao, P Bielik, P Tsankov, M Vechev
Advances in Neural Information Processing Systems 34, 26858-26870, 2021
272021
Avoiding Robust Misclassifications for Improved Robustness without Accuracy Loss
Y Merkli, P Bielik, P TSANKOV, M Vechev
Bayonet: probabilistic inference for networks
T Gehr, S Misailovic, P Tsankov, L Vanbever, P Wiesmann, M Vechev
ACM SIGPLAN Notices 53 (4), 586-602, 2018
252018
Constructing mid-points for two-party asynchronous protocols
P Tsankov, M Torabi-Dashti, D Basin
Principles of Distributed Systems: 15th International Conference, OPODIS …, 2011
12011
Debin
J He, P Ivanov, P Tsankov, V Raychev, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
12018
Debin: Predicting debug information in stripped binaries
J He, P Ivanov, P Tsankov, V Raychev, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1312018
Decentralized composite access control
P Tsankov, S Marinovic, MT Dashti, D Basin
Principles of Security and Trust, 245-264, 2014
262014
DP-Finder
B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
12018
Dp-finder: Finding differential privacy violations by sampling and optimization
B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
722018
ERAN User Manual
G Singh, M Balunovic, A Ruoss, C Müller, J Maurer, A Hoffmann, ...
Execution hijacking: Improving dynamic analysis by flying off course
P Tsankov, W Jin, A Orso, S Sinha
IEEE ICST 2011, 2011
172011
Fail-Secure Access Control
P Tsankov, S Marinovic, M Torabi Dashti, D Basin
ACM CCS 2014, 1157-1168, 2014
82014
FASE: Functionality-Aware Security Enforcement
P Tsankov, M Pistoia, O Tripp, M Vechev, P Ferrara
ACM ACSAC 2016, 2016
22016
Force Open
K Wst, P Tsankov, S Radomirovi, M Torabi Dashti
Digital Investigation: The International Journal of Digital Forensics …, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20