Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits

Tudor Dumitras , Carl Sabottke , Octavian Suciu
usenix security symposium 1041 -1056

138
2015
Enabling on-chip diversity through architectural communication design

Radu Marculescu , Tudor Dumitras , Sam Kerner
asia and south pacific design automation conference 799 -805

6
2004
No more HotDependencies: toward dependency-agnostic online upgrades in distributed systems

Tudor Dumitras , Jiaqi Tan , Priya Narasimhan , Zhengheng Gho
hot topics in system dependability 14

8
2007
Ask WINE: are we safer today? evaluating operating system security through big data analysis

Petros Efstathopoulos , Tudor Dumitras
usenix conference on large scale exploits and emergent threats 11 -11

9
2012
The Global Cyber-Vulnerability Report

Michael Ovelgonne , Tudor Dumitras , B. Aditya Prakash , V.S. Subrahmanian

16
2015
Testing Run-time Evolving Systems.

Frank Eliassen , Henry Muccini , Tudor Dumitras , Kurt Geihs
dagstuhl seminar proceedings 0

5
2009
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.

Petros Efstathopoulos , Tudor Dumitras , Kartik Nayak , Daniel Marino
recent advances in intrusion detection 426 -446

8
2014
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching

Leyla Bilge , Tudor Dumitras , Antonio Nappa , Richard Johnson
Actas de las primeras Jornadas Nacionales de Investigación en Ciberseguridad: León, 14, 15, 16 de septiembre de 2015. I JNIC2015, 2015, ISBN 978-84-9773-742-5, págs. 14-15 14 -15

2015
Investigating zero-day attacks

Leyla Bilge , Tudor Dumitras
;login:: the magazine of USENIX & SAGE 38 ( 4) 6 -12

2
2013
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

Andrew Ruef , Tudor Dumitras , Michael W. Hicks , Octavian Suciu
arXiv: Cryptography and Security

19
2017
Board # 84 : Traditional versus Hardware-driven Introductory Programming Courses: a Comparison of Student Identity, Efficacy and Success

Andrew Elby , Stephen Secules , Shuvra Bhattacharyya , Wesley G. Lawson
2017 ASEE Annual Conference & Exposition

2017
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate.

Tudor Dumitras , Bum Jun Kwon , Doowon Kim , Kristián Kozák
arXiv: Cryptography and Security

17
2018
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild

Tudor Dumitras , Mingyan Liu , Armin Sarabi , Yang Liu
usenix security symposium 903 -918

9
2018
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI

Tudor Dumitras , Bum Jun Kwon , Doowon Kim , Christopher Gates
usenix security symposium 851 -868

27
2018
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks

Dana Dachman-Soled , Tudor Dumitras , Sanghyun Hong , Yigitcan Kaya
arXiv: Cryptography and Security

55
2018
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking

Tudor Dumitras , Sanghyun Hong , Yigitcan Kaya
international conference on machine learning 3301 -3310

29
2019
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Tudor Dumitras , Ali Shafahi , Tom Goldstein , Christoph Studer
neural information processing systems 31 6103 -6113

693
2018
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.

Hal Daumé , Tudor Dumitras , Octavian Suciu , Yigitcan Kaya
usenix security symposium 1299 -1316

216
2018