- Dynamic Policies Revisited
- Automated Classification of Overfitting Patches with Statically Extracted Code Features
- Security-Aware Multi-User Architecture for IoT
- Refinement-Based Verification of Device-to-Device Information Flow
- Enclave-Based Secure Programming with JE
- Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly
- A Software-Repair Robot Based on Continual Learning
- SandTrap: Securing JavaScript-driven Trigger-Action Platforms
- A comprehensive study of bloated dependencies in the Maven ecosystem
- CROW: Code Diversification for WebAssembly
- Automated patch assessment for program repair at scale
- Browser Fingerprinting : A Survey
- PomCho : Atool chain for choreographic design
- InSpectre : Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
- SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web
- Friendly Fire: Cross-App Interactions in IoT Platforms
- Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks
- mCoq: Mutation Analysis for Coq Verification Projects
- Trustworthy isolation of DMA devices
- Hoare-Style Logic for Unstructured Programs