Suman Jana

Orcid: 0000-0003-3518-4877

Affiliations:
  • Columbia University, New York, NY, USA
  • University of Texas at Austin, TX, USA
  • University of Utah, Salt Lake City, UT, USA


According to our database1, Suman Jana authored at least 85 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TrustLLM: Trustworthiness in Large Language Models.
CoRR, 2024

2023
Learning Approximate Execution Semantics From Traces for Binary Function Similarity.
IEEE Trans. Software Eng., April, 2023

Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain.
CoRR, 2023

PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
CoRR, 2023

Symmetry-Preserving Program Representations for Learning Code Semantics.
CoRR, 2023

An Improved Parametric Method for Selecting Different Types of Tesla Transformer Primary Coil to Construct an Artificial Lightning Simulator.
IEEE Access, 2023

Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
MC<sup>2</sup>: Rigorous and Efficient Directed Greybox Fuzzing.
CoRR, 2022

FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022

Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

NeuDep: neural binary memory dependence analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

General Cutting Planes for Bound-Propagation-Based Neural Network Verification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks.
Proceedings of the International Conference on Machine Learning, 2022

MC2: Rigorous and Efficient Directed Greybox Fuzzing.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification.
CoRR, 2021

Fine Grained Dataflow Tracking with Proximal Gradients.
Proceedings of the 30th USENIX Security Symposium, 2021

AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads.
Proceedings of the 30th USENIX Security Symposium, 2021

Cost-Aware Robust Tree Ensembles for Security Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

StateFormer: fine-grained type recovery from binaries using generative state modeling.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

DistAI: Data-Driven Automated Invariant Learning for Distributed Protocols.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Robustness Verification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

XDA: Accurate, Robust Disassembly with Transfer Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers.
Proceedings of the 9th International Conference on Learning Representations, 2021

Learning Security Classifiers with Verified Global Robustness Properties.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020

Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity.
CoRR, 2020

Towards Understanding Fast Adversarial Training.
CoRR, 2020

Towards Practical Lottery Ticket Hypothesis for Adversarial Training.
CoRR, 2020

On Pruning Adversarially Robust Neural Networks.
CoRR, 2020

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap.
CoRR, 2020

On Training Robust PDF Malware Classifiers.
Proceedings of the 29th USENIX Security Symposium, 2020

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

MTFuzz: fuzzing with a multi-task neural network.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Learning nonlinear loop invariants with gated continuous logic networks.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

HYDRA: Pruning Adversarially Robust Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Ensuring Fairness Beyond the Training Data.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

CLN2INV: Learning Loop Invariants with Continuous Logic Networks.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Bringing Engineering Rigor to Deep Learning.
ACM SIGOPS Oper. Syst. Rev., 2019

Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019

Training Robust Tree Ensembles for Security.
CoRR, 2019

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks.
CoRR, 2019

Towards Compact and Robust Deep Neural Networks.
CoRR, 2019

Enhancing Gradient-based Attacks with Symbolic Intervals.
CoRR, 2019

NEUZZ: Efficient Fuzzing with Neural Program Smoothing.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Certified Robustness to Adversarial Examples with Differential Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
DeepXplore: Automated Whitebox Testing of Deep Learning Systems.
GetMobile Mob. Comput. Commun., 2018

MixTrain: Scalable Training of Formally Robust Neural Networks.
CoRR, 2018

NEUZZ: Efficient Fuzzing with Neural Program Learning.
CoRR, 2018

On the Connection between Differential Privacy and Adversarial Robustness in Machine Learning.
CoRR, 2018

Formal Security Analysis of Neural Networks using Symbolic Intervals.
Proceedings of the 27th USENIX Security Symposium, 2018

MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation.
Proceedings of the 27th USENIX Security Symposium, 2018

Efficient Formal Safety Analysis of Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

DeepTest: automated testing of deep-neural-network-driven autonomous cars.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.
CoRR, 2017

Tug-of-War: Observations on Unified Content Handling.
CoRR, 2017

HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

NEZHA: Efficient Domain-Independent Differential Testing.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Automatically Detecting Error Handling Bugs Using Error Specifications.
Proceedings of the 25th USENIX Security Symposium, 2016

APEx: automated inference of error specifications for C APIs.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis.
CoRR, 2015

Robust and Efficient Elimination of Cache and Timing Side Channels.
CoRR, 2015

No Escape From Reality: Security and Privacy of Augmented Reality Browsers.
Proceedings of the 24th International Conference on World Wide Web, 2015

Rethinking Security of Web-Based System Applications.
Proceedings of the 24th International Conference on World Wide Web, 2015

Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Password Managers: Attacks and Defenses.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Secret Key Extraction from Wireless Signal Strength in Real Environments.
IEEE Trans. Mob. Comput., 2013

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
Memento: Learning Secrets from Process Footprints.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Abusing File Processing in Malware Detectors for Fun and Profit.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Efficient construction of directed Redundant Steiner trees.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
TxBox: Building Secure, Efficient Sandboxes with System Transactions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

EVE: Verifying Correct Execution of Cloud-Hosted Web Applications.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011

2010
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements.
IEEE Trans. Mob. Comput., 2010

On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews.
IEEE Trans. Mob. Comput., 2010

2009
On the effectiveness of secret key extraction from wireless signal strength in real environments.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009


  Loading...