Rigel Gjomemo

Orcid: 0009-0001-3715-077X

According to our database1, Rigel Gjomemo authored at least 22 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective.
ACM Trans. Cyber Phys. Syst., April, 2023

Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
Extractor: Extracting Attack Behavior from Threat Reports.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures.
IEEE Access, 2020

2019
HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

AppSeer: discovering flawed interactions among Android components.
Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, 2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016

Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Chainsaw: Chained Automated Workflow-based Exploit Generation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
From Verification to Optimizations.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2015

Practical Exploit Generation for Intent Message Vulnerabilities in Android.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Digital Check Forgery Attacks on Client Check Truncation Systems.
Proceedings of the Financial Cryptography and Data Security, 2014

2011
Location-Based Access Control Using Semantic Web Technologies.
Proceedings of the Geospatial Semantics and the Semantic Web, 2011

2010
An interoperation framework for secure collaboration among organizations.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

2008
A Secure Mediator for Integrating Multiple Level Access Control Policies.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

A location aware role and attribute based access control system.
Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2008

A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments.
Proceedings of the Collaborative Computing: Networking, 2008


  Loading...