Understanding contention-based channels and using them for defense C Hunger, M Kazdagli, A Rawat, A Dimakis, S Vishwanath, M Tiwari 2015 IEEE 21st International Symposium on High Performance Computer …, 2015 | 99 | 2015 |
Quantifying and improving the efficiency of hardware-based mobile malware detectors M Kazdagli, VJ Reddi, M Tiwari 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016 | 58 | 2016 |
Morpheus: Benchmarking computational diversity in mobile malware M Kazdagli, L Huang, V Reddi, M Tiwari Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 17 | 2014 |
EMMA: A new platform to evaluate hardware-based mobile malware analyses M Kazdagli, L Huang, V Reddi, M Tiwari arXiv preprint arXiv:1603.03086, 2016 | 7 | 2016 |
Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies M Kazdagli, M Tiwari, A Kumar International Joint Conferences on Artificial Intelligence, 1850-1858, 2022 | 4 | 2022 |
The shape of alerts: Detecting malware using distributed detectors by robustly amplifying transient correlations M Kazdagli, C Caramanis, S Shakkottai, M Tiwari arXiv preprint arXiv:1803.00883, 2018 | 1 | 2018 |
Leveraging AI Planning For Detecting Cloud Security Vulnerabilities M Kazdagli, M Tiwari, A Kumar arXiv preprint arXiv:2402.10985, 2024 | | 2024 |
Information flow tracking using incremental profiling M Salajegheh, M Kazdagli, M Christodorescu US Patent 10,102,368, 2018 | | 2018 |