Follow
Rigel Gjomemo
Title
Cited by
Cited by
Year
Holmes: real-time apt detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
2019 IEEE Symposium on Security and Privacy (SP), 1137-1152, 2019
4012019
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487-504, 2017
2072017
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1632019
{NAVEX}: Precise and scalable exploit generation for dynamic web applications
A Alhuzali, R Gjomemo, B Eshete, VN Venkatakrishnan
27th USENIX Security Symposium (USENIX Security 18), 377-392, 2018
792018
Extractor: Extracting attack behavior from threat reports
K Satvat, R Gjomemo, VN Venkatakrishnan
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 598-615, 2021
672021
Chainsaw: Chained automated workflow-based exploit generation
A Alhuzali, B Eshete, R Gjomemo, VN Venkatakrishnan
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
482016
A location aware role and attribute based access control system
IF Cruz, R Gjomemo, B Lin, M Orsini
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances …, 2008
302008
A constraint and attribute based security framework for dynamic role assignment in collaborative environments
IF Cruz, R Gjomemo, B Lin, M Orsini
International Conference on Collaborative Computing: Networking …, 2008
282008
Propatrol: Attack investigation via extracted high-level tasks
S M. Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Information Systems Security: 14th International Conference, ICISS 2018 …, 2018
252018
Educational design research for the development of a collectible card game for cybersecurity learning
MK Thomas, A Shyjka, S Kumm, R Gjomemo
Journal of Formative Design in Learning 3, 27-38, 2019
172019
From verification to optimizations
R Gjomemo, KS Namjoshi, PH Phung, VN Venkatakrishnan, LD Zuck
Verification, Model Checking, and Abstract Interpretation: 16th …, 2015
132015
Digital check forgery attacks on client check truncation systems
R Gjomemo, H Malik, N Sumb, VN Venkatakrishnan, R Ansari
International conference on financial cryptography and data security, 3-20, 2014
132014
Static detection and automatic exploitation of intent message vulnerabilities in Android applications
D Gallingani
Politecnico di Milano, 2012
122012
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
M Asiri, N Saxena, R Gjomemo, P Burnap
ACM transactions on cyber-physical systems 7 (2), 1-33, 2023
92023
Practical exploit generation for intent message vulnerabilities in android
D Gallingani, R Gjomemo, VN Venkatakrishnan, S Zanero
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
92015
Attack analysis results for adversarial engagement 1 of the darpa transparent computing program
B Eshete, R Gjomemo, MN Hossain, S Momeni, R Sekar, S Stoller, ...
arXiv preprint arXiv:1610.06936, 2016
82016
An interoperation framework for secure collaboration among organizations
IF Cruz, R Gjomemo, G Jarzab
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010
82010
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability
M Kang, Y Xu, S Li, R Gjomemo, J Hou, VN Venkatakrishnan, Y Cao
2023 IEEE Symposium on Security and Privacy (SP), 1059-1076, 2023
62023
Leveraging static analysis tools for improving usability of memory error sanitization compilers
R Gjomemo, PH Phung, E Ballou, KS Namjoshi, VN Venkatakrishnan, ...
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
62016
A secure mediator for integrating multiple level access control policies
IF Cruz, R Gjomemo, M Orsini
International Conference on Knowledge-Based and Intelligent Information and …, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20