SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)The digest version of AsiaCCS’25 paper: “SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)”.Jun 3Jun 3
Mitigating Software Supply Chain Vulnerabilities with Zero-Trust DependenciesThis is a brief for the research paper “ZTDJava: Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies”, published…May 7May 7
Prof. Davis’s Advice on Applying to Graduate School in Computing in the USANotes about applying to graduate schoolApr 28Apr 28
Essential vs. Accidental Arguments in Novelty Claims for System DesignThoughts on the effective analysis of software systems in research.Apr 15Apr 15
An Industry Interview Study of Software Signing for Supply Chain SecurityThis is a brief for the research paper “An Industry Interview Study of Software Signing for Supply Chain Security”, at USENIX Security…Apr 10Apr 10
FAIL: Analyzing Software Failures from the News Using LLMsThis is a brief for the research paper “FAIL: Analyzing Software Failures from the News Using LLMs”, published at the IEEE/ACM 2024…Nov 9, 2024Nov 9, 2024
Pruning One More Token is EnoughThis is a brief for the research paper “Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision…Nov 8, 2024Nov 8, 2024
On the Contents and Utility of IoT Cybersecurity GuidelinesThis is a brief for the research paper “On the Contents and Utility of IoT Cybersecurity Guidelines,” published at ACM FSE 2024.Jul 8, 2024Jul 8, 2024
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing FactorsThis is a brief for the research paper “Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors,”…May 10, 2024May 10, 2024