Identifying security critical properties for the dynamic verification of a processor R Zhang, N Stanley, C Griggs, A Chi, C Sturton ACM SIGARCH Computer Architecture News 45 (1), 541-554, 2017 | 49 | 2017 |
Threat model for BGP path security S Kent, A Chi | 39 | 2014 |
Signed Object Template for the Resource Public Key Infrastructure (RPKI) M Lepinski, A Chi, S Kent | 31* | 2012 |
Passive decryption on encrypted traffic to generate more accurate machine learning training data BH Anderson, A Chi, D McGrew, SW Dunlop US Patent 10,536,268, 2020 | 26 | 2020 |
Limitless http in an https world: Inferring the semantics of the https protocol without decryption B Anderson, A Chi, S Dunlop, D McGrew Proceedings of the Ninth ACM conference on data and application security and …, 2019 | 21 | 2019 |
A System to Verify Network Behavior of Known Cryptographic Clients A Chi, RA Cochran, M Nesfield, MK Reiter, C Sturton 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 2017 | 9 | 2017 |
Server-side verification of client behavior in cryptographic protocols A Chi, R Cochran, M Nesfield, MK Reiter, C Sturton arXiv preprint arXiv:1603.04085, 2016 | 4 | 2016 |
Detecting Weak Keys in Manufacturing Certificates: A Case Study A Chi, B Enright, D McGrew Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 2 | 2023 |
A first-in-class PD1-IL18 immunocytokine (BPT567) targets PD-1+ IL18R+ CD8+ T effector cells enriched in the tumor microenvironment and exhibits potent … JP Carralot, K Martin, RA Sanchez, R Meoded, C Herr, P Moosman, ... Cancer Research 83 (7_Supplement), 1850-1850, 2023 | 1 | 2023 |
IDENTIFYING UNMANAGED CLOUD RESOURCES WITH ENDPOINT AND NETWORK LOGS BH Anderson, A Chi, DA Mcgrew, SS Ahluwalia US Patent App. 18/404,403, 2024 | | 2024 |
Identifying unmanaged cloud resources with endpoint and network logs BH Anderson, A Chi, DA McGrew, SS Ahluwalia US Patent 11,888,760, 2024 | | 2024 |
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk A Chi, B Anderson, MK Reiter Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Modified il-18 polypeptides VR Pattabiraman, B Kreft, A Goepfert, T Ongaro, J Carralot, P Moosmann, ... US Patent App. 18/113,409, 2023 | | 2023 |
Immune antigen specific il-18 immunocytokines and uses thereof VR Pattabiraman, B Kreft, J Carralot, A Goepfert, K Martin, A Chi US Patent App. 18/113,413, 2023 | | 2023 |
Verifying the Behavior of Security-Impacting Programs A Chi The University of North Carolina at Chapel Hill, 2023 | | 2023 |
USING SITE-SPECIFIC CHEMICAL CONJUGATION TO GENERATE SUPERIOR HALF-LIFE EXTENDED OR PD-1TARGETED FORMATS OF A POTENT IL-18 VARIANT RESISTANT TO IL-18 BINDING PROTEIN J Carralot, C Delon, RA Sanchez, R Meoded, P Moosman, K Martin, ... Journal for ImmunoTherapy of Cancer 10, A1122-A1122, 2022 | | 2022 |