The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
Nappa, Antonio, Johnson, Richard, Bilge, Leyla, Caballero, Juan, Dumitras, Tudor
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Published in 2015 IEEE Symposium on Security and Privacy (01.05.2015)
Get full text
Conference Proceeding
How to trick the Borg: threat models against manual and automated techniques for detecting network attacks
Sabottke, Carl, Chen, Daniel, Layman, Lucas, Dumitraş, Tudor
Published in Computers & security (01.03.2019)
Published in Computers & security (01.03.2019)
Get full text
Journal Article
Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection
Hong, Sanghyun, Nicolae, Alina, Srivastava, Abhinav, Dumitraş, Tudor
Published in Computers & security (01.11.2018)
Published in Computers & security (01.11.2018)
Get full text
Journal Article
A study of unpredictability in fault-tolerant middleware
Dumitraş, Tudor, Narasimhan, Priya
Published in Computer networks (Amsterdam, Netherlands : 1999) (26.02.2013)
Published in Computer networks (Amsterdam, Netherlands : 1999) (26.02.2013)
Get full text
Journal Article
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System
Dumitraş, Tudor, Kaya, Yiğitcan, Mărginean, Radu, Suciu, Octavian
Published in Security Protocols XXVI (01.01.2018)
Published in Security Protocols XXVI (01.01.2018)
Get full text
Book Chapter
Evolving NoSQL Databases without Downtime
Saur, Karla, Dumitras, Tudor, Hicks, Michael
Published in 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME) (01.10.2016)
Published in 2016 IEEE International Conference on Software Maintenance and Evolution (ICSME) (01.10.2016)
Get full text
Conference Proceeding
Toward Semantic Cryptography APIs
Indela, Soumya, Kulkarni, Mukul, Nayak, Kartik, Dumitras, Tudor
Published in 2016 IEEE Cybersecurity Development (SecDev) (01.11.2016)
Published in 2016 IEEE Cybersecurity Development (SecDev) (01.11.2016)
Get full text
Conference Proceeding
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns
Kwon, Bum Jun, Virinchi Srinivas, Deshpande, Amol, Tudor Dumitraş
Published in arXiv.org (09.11.2016)
Published in arXiv.org (09.11.2016)
Get full text
Paper
Journal Article
Spatio-temporal mining of software adoption & penetration
Papalexakis, Evangelos E., Dumitras, Tudor, Duen Horng Chau, Prakash, B. Aditya, Faloutsos, Christos
Published in 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) (01.08.2013)
Published in 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) (01.08.2013)
Get full text
Conference Proceeding
Towards on-chip fault-tolerant communication
Dumitraş, Tudor, Kerner, Sam, Mărculescu, Radu
Published in Proceedings of the 2003 Asia and South Pacific Design Automation Conference (01.01.2003)
Published in Proceedings of the 2003 Asia and South Pacific Design Automation Conference (01.01.2003)
Get full text
Conference Proceeding