Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits

Tudor Dumitras , Carl Sabottke , Octavian Suciu
usenix security symposium 1041 -1056

138
2015
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

Andrew Ruef , Tudor Dumitras , Michael W. Hicks , Octavian Suciu
arXiv: Cryptography and Security

19
2017
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Tudor Dumitras , Ali Shafahi , Tom Goldstein , Christoph Studer
neural information processing systems 31 6103 -6113

693
2018
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.

Hal Daumé , Tudor Dumitras , Octavian Suciu , Yigitcan Kaya
usenix security symposium 1299 -1316

216
2018
Exploring Adversarial Examples in Malware Detection

Octavian Suciu , Scott E. Coull , Jeffrey Johns
ieee symposium on security and privacy 8 -14

157
2019
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System

Tudor Dumitraş , Yiğitcan Kaya , Radu Mărginean , Octavian Suciu
international workshop on security 150 -162

2018
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Octavian Suciu , Radu Mărginean , Yiğitcan Kaya , Hal Daumé III
arXiv preprint arXiv:1803.06975

2
2018
Expected exploitability: Predicting the development of functional vulnerability exploits

Octavian Suciu , Connor Nelson , Zhuoer Lyu , Tiffany Bao
31st USENIX Security Symposium (USENIX Security 22) 377 -394

37
2022
Systems and methods for predicting development of functional vulnerability exploits

Tiffany Bao , Connor Nelson , Zhuoer Lyu , Tudor Dumitras

2023
Enhancing Vulnerability prioritization: Data-driven exploit predictions with community-driven insights

Jay Jacobs , Sasha Romanosky , Octavian Suciu , Ben Edwards
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 194 -206

11
2023
Poster: Exploring Adversarial Examples in Malware Detection

Octavian Suciu , Scott E Coull , Jeffrey Johns

Data-Driven Techniques for Vulnerability Assessments

Octavian-Petru Suciu
University of Maryland, College Park

1
2021