Follow
Ali Ahad
Title
Cited by
Cited by
Year
Swarmbug: debugging configuration bugs in swarm robotics
C Jung, A Ahad, J Jung, S Elbaum, Y Kwon
29th ACM Joint Meeting on European Software Engineering Conference and …, 2021
142021
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
82022
Forensic analysis of configuration-based attacks
MA Inam, W Ul Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar
Proceedings of the 2022 Network and Distributed System Security Symposium, 2022
72022
Spinner: Automated Dynamic Command Subsystem Perturbation
M Wang, C Jung, A Ahad, Y Kwon
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
22021
PYFET: Forensically Equivalent Transformation for Python Binary Decompilation
A Ahad, C Jung, A Askar, D Kim, T Kim, Y Kwon
2023 IEEE Symposium on Security and Privacy (SP), 3296-3313, 2023
12023
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
A Ahad, G Wang, CH Kim, S Jana, Z Lin, Y Kwon
28th ACM International Conference on Architectural Support for Programming …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–6