Tudor Dumitras

Orcid: 0000-0003-4350-7226

Affiliations:
  • University of Maryland, College Park, MD, USA
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Tudor Dumitras authored at least 74 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
Proceedings of the 30th USENIX Security Symposium, 2021

Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

When Does Data Augmentation Help With Membership Inference Attacks?
Proceedings of the 38th International Conference on Machine Learning, 2021

A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference.
Proceedings of the 9th International Conference on Learning Representations, 2021

Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
On the Effectiveness of Regularization Against Membership Inference Attacks.
CoRR, 2020

On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping.
CoRR, 2020

How to 0wn the NAS in Your Spare Time.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Poster: On the Feasibility of Training Neural Networks with Visibly Watermarked Dataset.
CoRR, 2019

How to trick the Borg: threat models against manual and automated techniques for detecting network attacks.
Comput. Secur., 2019

Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Shallow-Deep Networks: Understanding and Mitigating Network Overthinking.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
How to Stop Off-the-Shelf Deep Neural Networks from Overthinking.
CoRR, 2018

Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks.
CoRR, 2018

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate.
CoRR, 2018

Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection.
Comput. Secur., 2018

Analysis of SSL certificate reissues and revocations in the wake of heartbleed.
Commun. ACM, 2018

From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Proceedings of the 27th USENIX Security Symposium, 2018

When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Proceedings of the 27th USENIX Security Symposium, 2018

Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.
Proceedings of the Security Protocols XXVI, 2018

Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Go Serverless: Securing Cloud via Serverless Design Patterns.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Asking for a Friend: Evaluating Response Biases in Security User Studies.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Breaking Bad: Forecasting Adversarial Android Bad Behavior.
Proceedings of the From Database to Cyber Security, 2018

2017
Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach.
ACM Trans. Intell. Syst. Technol., 2017

Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning.
CoRR, 2017

Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Toward Semantic Cryptography APIs.
Proceedings of the IEEE Cybersecurity Development, 2016

Helping Johnny encrypt: toward semantic interfaces for cryptographic frameworks.
Proceedings of the 2016 ACM International Symposium on New Ideas, 2016

"Infect-me-not": A user-centric and site-centric study of web-based malware.
Proceedings of the 2016 IFIP Networking Conference, 2016

Evolving NoSQL Databases without Downtime.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.
Proceedings of the 24th USENIX Security Symposium, 2015

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

The Global Cyber-Vulnerability Report
Terrorism, Security, and Computation, Springer, ISBN: 978-3-319-25760-0, 2015

2014
SharkFin: Spatio-temporal mining of software adoption and penetration.
Soc. Netw. Anal. Min., 2014

Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
Investigating Zero-Day Attacks.
login Usenix Mag., 2013

A study of unpredictability in fault-tolerant middleware.
Comput. Networks, 2013

Spatio-temporal mining of software adoption & penetration.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

The Provenance of WINE.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Before we knew it: an empirical study of zero-day attacks in the real world.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Cloud software upgrades: Challenges and opportunities.
Proceedings of the 5th IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011

Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE).
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Improving the Dependability of Distributed Systems through AIR Software Upgrades.
PhD thesis, 2010

Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09): http://www.hotswup.org/2009/.
ACM SIGOPS Oper. Syst. Rev., 2010

To upgrade or not to upgrade: impact of online upgrades across multiple administrative domains.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

2009
Second ACM workshop on hot topics in software upgrades (HotSWUp 2009).
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Dependable, online upgrades in enterprise systems.
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Toward upgrades-as-a-service in distributed systems.
Proceedings of the Middleware 2008, 2009

Why Do Upgrades Fail and What Can We Do about It?
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009

Testing Run-time Evolving Systems.
Proceedings of the Self-Healing and Self-Adaptive Systems, 10.05. - 15.05.2009, 2009

2008
1st ACM workshop on hot topics in software upgrades (HotSWUp 2008).
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

2007
Stochastic Communication: A New Paradigm for Fault-Tolerant Networks-on-Chip.
VLSI Design, 2007

Got predictability?: experiences with fault-tolerant middleware.
Proceedings of the Middleware 2007, 2007

2006
Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired.
Proceedings of the Tenth IEEE International Symposium on Wearable Computers (ISWC 2006), 2006

Ecotopia: An Ecological Framework for Change Management in Distributed Systems.
Proceedings of the Architecting Dependable Systems IV [the book is a result of DSN 2006 workshops, 2006

2005
MEAD: support for Real-Time Fault-Tolerant CORBA.
Concurr. Pract. Exp., 2005

Fault-Tolerant Middleware and the Magical 1%.
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005

2004
Architecting and Implementing Versatile Dependability.
Proceedings of the Architecting Dependable Systems III [the book is a result of the ICSE 2004 and DSN 2004 workshops], 2004

Enabling on-chip diversity through architectural communication design.
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004

2003
On-Chip Stochastic Communication.
Proceedings of the 2003 Design, 2003

Towards on-chip fault-tolerant communication.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

On-Chip Stochastic Communication.
Proceedings of the Embedded Software for SoC, 2003


  Loading...