Tudor Dumitras
Title
Cited by
Cited by
Year
Before we knew it: an empirical study of zero-day attacks in the real world
L Bilge, T Dumitraş
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4762012
Towards on-chip fault-tolerant communication
T Dumitras, S Kerner, R Marculescu
Proceedings of the ASP-DAC Asia and South Pacific Design Automation …, 2003
1962003
Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits
C Sabottke, O Suciu, T Dumitraș
24th {USENIX} Security Symposium ({USENIX} Security 15), 1041-1056, 2015
1572015
Poison frogs! targeted clean-label poisoning attacks on neural networks
A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ...
Advances in Neural Information Processing Systems, 6103-6113, 2018
1462018
On-chip stochastic communication [soc applications]
T Dumitras, R Marculescu
2003 Design, Automation and Test in Europe Conference and Exhibition, 790-795, 2003
1252003
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)
T Dumitras, D Shou
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1142011
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
972015
Stochastic communication: A new paradigm for fault-tolerant networks-on-chip
P Bogdan, T Dumitraş, R Marculescu
VLSI design 2007, 2007
932007
Why do upgrades fail and what can we do about it?
T Dumitraş, P Narasimhan
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2009
912009
MEAD: support for Real‐Time Fault‐Tolerant CORBA
P Narasimhan, TA Dumitraş, AM Paulos, SM Pertet, CF Reverte, ...
Concurrency and Computation: Practice and Experience 17 (12), 1527-1545, 2005
892005
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
872015
Analysis of SSL certificate reissues and revocations in the wake of Heartbleed
L Zhang, D Choffnes, D Levin, T Dumitraş, A Mislove, A Schulman, ...
Proceedings of the 2014 Conference on Internet Measurement Conference, 489-502, 2014
812014
Some vulnerabilities are different than others
K Nayak, D Marino, P Efstathopoulos, T Dumitraş
International Workshop on Recent Advances in Intrusion Detection, 426-446, 2014
732014
When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks
O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras
27th {USENIX} Security Symposium ({USENIX} Security 18), 1299-1316, 2018
612018
Featuresmith: Automatically engineering features for malware detection by mining the security literature
Z Zhu, T Dumitraş
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
602016
Cloud software upgrades: Challenges and opportunities
I Neamtiu, T Dumitraş
2011 International Workshop on the Maintenance and Evolution of Service …, 2011
492011
To upgrade or not to upgrade: impact of online upgrades across multiple administrative domains
T Dumitraş, P Narasimhan, E Tilevich
Proceedings of the ACM international conference on Object oriented …, 2010
402010
Precious Metal Flows and Prices in Western and Southern Asia, 1500-1750: Some Comparative and Conjunctural Aspects
S Subrahmanyam
Studies in History 7 (1), 78-105, 1991
40*1991
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
352017
Spatio-temporal mining of software adoption & penetration
EE Papalexakis, T Dumitraş, DH Chau, BA Prakash, C Faloutsos
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
332013
The system can't perform the operation now. Try again later.
Articles 1–20