Don’t let Generative AI Create Just-In-Time Knowledge WorkAn examination of the tradeoff between economic prosperity and national security that GenAI offers us12h ago12h ago
Different Contributions Require Different Novelty ArgumentsThis is another post in my series of capturing conversations I've had with graduate students that contain some kernel of insight I thought…6d ago6d ago
PickleBall: Secure Deserialization of Pickle-based Machine Learning ModelsThis blog post summarizes our work “PickleBall: Secure Deserialization of Pickle-based Machine Learning Models”, which appeared at the 2025…Nov 24, 2025A response icon1Nov 24, 2025A response icon1
LEMIX: Enabling Testing of Embedded Applications as Linux ApplicationsThis blog post summarizes our recent work, “LEMIX: Enabling Testing of Embedded Applications as Linux Applications”, which appeared at the…Sep 2, 2025Sep 2, 2025
Phishing Training Still Isn’t Working, So Why Are We Still Paying for It?As anyone who works with me professionally knows, I’m an empiricist at heart. I’m excited to share this recent work on phishing training!Jun 19, 2025Jun 19, 2025
SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)The digest version of AsiaCCS’25 paper: “SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)”.Jun 3, 2025Jun 3, 2025
Mitigating Software Supply Chain Vulnerabilities with Zero-Trust DependenciesThis is a brief for the research paper “ZTDJava: Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies”, published…May 7, 2025May 7, 2025
Prof. Davis’s Advice on Applying to Graduate School in Computing in the USANotes about applying to graduate schoolApr 28, 2025Apr 28, 2025
Essential vs. Accidental Arguments in Novelty Claims for System DesignThoughts on the effective analysis of software systems in research.Apr 15, 2025Apr 15, 2025
An Industry Interview Study of Software Signing for Supply Chain SecurityThis is a brief for the research paper “An Industry Interview Study of Software Signing for Supply Chain Security”, at USENIX Security…Apr 10, 2025Apr 10, 2025