Kotaiba Alachkar, Dirk Gaastra, Eduardo Barbaro, Michel van Eeten, Yury Zhauniarovich (2025), EvilEDR: Repurposing EDR as an Offensive Tool, In Proceedings of the 34th USENIX Security Symposium p.587-606.

Max van der Horst, Ricky Kho, Olga Gadyatskaya, Michel Mollema, Michel van Eeten, Yury Zhauniarovich (2025), High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution, In USENIX Security '25.

Roberto Moratore, Eduardo Barbaro, Yury Zhauniarovich (2025), IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies, Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Matthias Eckhart, Patrick P. C. Lee, Saman Zonouz (Eds.), In Proceedings - 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2025 p.126-132.

Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich (2025), The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes, Marina Blanton, William Enck, Cristina Nita-Rotaru (Eds.), In Proceedings - 46th IEEE Symposium on Security and Privacy, SP 2025 p.3180-3198.

Szu-Chun Huang, Harm Griffioen, Max van der Horst, Georgios Smaragdakis, Michel van Eeten, Yury Zhauniarovich (2025), Trust but Verify: An Assessment of Vulnerability Tagging Services, In USENIX Security Symposium p.823-842.

Anne Kee Doing, Eduardo Barbaro, Frank van der Roest, Pieter van Gelder, Yury Zhauniarovich, Simon Parkin (2024), An Analysis of Phishing Reporting Activity in a Bank, In Proceedings of the 2024 European Symposium on Usable Security, EuroUSEC 2024 p.44-57.

Berend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich (2024), Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach, In ASIA CCS '24 p.1770-1783.

Tom-Martijn Roelofs, Eduardo Barbaro, Svetlana Pekarskikh, Katarzyna Orzechowska, Marta Kwapień, Jakub Tyrlik, Dinu Smadu, Michel van Eeten, Yury Zhauniarovich (2024), Finding Harmony in the Noise: Blending Security Alerts for Attack Detection, In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing p.1385-1394.

Hilmy Hanif, J.E. Constantino Torres, M.T. Sekwenz, M.J.G. van Eeten, J. Ubacht, Ben Wagner, Y. Zhauniarovich (2024), Navigating the EU AI Act Maze using a Decision-Tree Approach, In ACM Journal on Responsible Computing.

Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Gañán, Yury Zhauniarovich (2024), Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks, Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis (Eds.), In Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings p.23-41, Springer.