Neutaint: Efficient Dynamic Taint Analysis with Neural Networks D She, Y Chen, A Shah, B Ray, S Jana IEEE Symposium on Security and Privacy (S&P), 2020 | 67 | 2020 |
Effective Seed Scheduling With Graph Centrality Analysis D She, A Shah, S Jana IEEE Symposium on Security and Privacy (S&P), 2022 | 54* | 2022 |
MC: Rigorous and Efficient Directed Greybox Fuzzing A Shah, D She, S Sadhu, K Singal, P Coffman, S Jana ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022 | 21 | 2022 |
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. G Almashaqbeh, F Benhamouda, S Han, D Jaroslawicz, T Malkin, A Nicita, ... Proceedings on Privacy Enhancing Technologies, 2021 | 14 | 2021 |
Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis G Ryan, A Shah, D She, S Jana IEEE Symposium on Security and Privacy (S&P), 2023 | 4 | 2023 |
Fine Grained Dataflow Tracking with Proximal Gradients G Ryan, A Shah, D She, K Bhat, S Jana USENIX Security Symposium, 2021 | 4 | 2021 |
Analysis of real-time software A Shah, G Prisament, M Beardsworth, D Hrybenko US Patent US20210191840A1, 2021 | | 2021 |