Honeyplc: A next-generation honeypot for industrial control systems E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 80 | 2020 |
Random test data generation for Java classes annotated with JML specifications Y Cheon, CE Rubio-Medrano | 51 | 2007 |
Understanding and predicting private interactions in underground forums Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 22 | 2019 |
Supporting secure collaborations with attribute-based access control CE Rubio-Medrano, C D'Souza, GJ Ahn 9th IEEE International Conference on Collaborative Computing: Networking …, 2013 | 20 | 2013 |
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service} Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ... 30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021 | 19 | 2021 |
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers A Soneji, FB Kokulu, C Rubio-Medrano, T Bao, R Wang, Y Shoshitaishvili, ... 2022 IEEE Symposium on Security and Privacy (SP), 1845-1862, 2022 | 15 | 2022 |
Federated access management for collaborative network environments: Framework and case study CE Rubio-Medrano, Z Zhao, A Doupé, GJ Ahn Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015 | 13 | 2015 |
Mutated policies: towards proactive attribute-based defenses for access control CE Rubio-Medrano, J Lamp, A Doupé, Z Zhao, GJ Ahn Proceedings of the 2017 Workshop on Moving Target Defense, 39-49, 2017 | 12 | 2017 |
DyPolDroid: Protecting against permission-abuse attacks in android CE Rubio-Medrano, PKD Soundrapandian, M Hill, L Claramunt, J Baek, ... Information Systems Frontiers 25 (2), 529-548, 2023 | 9 | 2023 |
Effectively enforcing authorization constraints for emerging space-sensitive technologies CE Rubio-Medrano, S Jogani, M Leitner, Z Zhao, GJ Ahn Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 8 | 2019 |
Towards effective verification of multi-model access control properties BJ Berger, C Maeder, R Wete Nguempnang, K Sohr, C Rubio-Medrano Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 7 | 2019 |
Ontoeds: Protecting energy delivery systems by collaboratively analyzing security requirements J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn 2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017 | 6 | 2017 |
Verifying access control properties with design by contract: Framework and lessons learned CE Rubio-Medrano, GJ Ahn, K Sohr 2013 IEEE 37th Annual Computer Software and Applications Conference, 21-26, 2013 | 6 | 2013 |
Exsol: Collaboratively assessing cybersecurity risks for protecting energy delivery systems J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn 2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy …, 2019 | 4 | 2019 |
The danger of missing instructions: A systematic analysis of security requirements for mcps J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018 | 4 | 2018 |
A Formal Specification in JML of Java Security Package P Agarwal, CE Rubio-Medrano, Y Cheon, PJ Teller Advances and Innovations in Systems, Computing Sciences and Software …, 2007 | 4 | 2007 |
EDSGuard: Enforcing network security requirements for energy delivery systems V Coughlin, C Rubio-Medrano, Z Zhao, GJ Ahn 2018 IEEE International Conference on Communications, Control, and Computing …, 2018 | 3 | 2018 |
Achieving security assurance with assertion-based application construction CE Rubio-Medrano, GJ Ahn, K Sohr 10th IEEE International Conference on Collaborative Computing: Networking …, 2014 | 3 | 2014 |
Spacemediator: Leveraging authorization policies to prevent spatial and privacy attacks in mobile augmented reality L Claramunt, C Rubio-Medrano, J Baek, GJ Ahn Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023 | 2 | 2023 |
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems CE Rubio-Medrano, Z Zhao, GJ Ahn 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 2 | 2020 |