PickleBall: Secure Deserialization of Pickle-based Machine Learning ModelsThis blog post summarizes our work “PickleBall: Secure Deserialization of Pickle-based Machine Learning Models”, which appeared at the 2025…Nov 24, 2025A response icon1Nov 24, 2025A response icon1
LEMIX: Enabling Testing of Embedded Applications as Linux ApplicationsThis blog post summarizes our recent work, “LEMIX: Enabling Testing of Embedded Applications as Linux Applications”, which appeared at the…Sep 2, 2025Sep 2, 2025
Phishing Training Still Isn’t Working, So Why Are We Still Paying for It?As anyone who works with me professionally knows, I’m an empiricist at heart. I’m excited to share this recent work on phishing training!Jun 19, 2025Jun 19, 2025
SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)The digest version of AsiaCCS’25 paper: “SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)”.Jun 3, 2025Jun 3, 2025
Mitigating Software Supply Chain Vulnerabilities with Zero-Trust DependenciesThis is a brief for the research paper “ZTDJava: Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies”, published…May 7, 2025May 7, 2025
Prof. Davis’s Advice on Applying to Graduate School in Computing in the USANotes about applying to graduate schoolApr 28, 2025Apr 28, 2025
Essential vs. Accidental Arguments in Novelty Claims for System DesignThoughts on the effective analysis of software systems in research.Apr 15, 2025Apr 15, 2025
An Industry Interview Study of Software Signing for Supply Chain SecurityThis is a brief for the research paper “An Industry Interview Study of Software Signing for Supply Chain Security”, at USENIX Security…Apr 10, 2025Apr 10, 2025
FAIL: Analyzing Software Failures from the News Using LLMsThis is a brief for the research paper “FAIL: Analyzing Software Failures from the News Using LLMs”, published at the IEEE/ACM 2024…Nov 9, 2024Nov 9, 2024
Pruning One More Token is EnoughThis is a brief for the research paper “Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision…Nov 8, 2024Nov 8, 2024