1. “Forensic Analysis of Configuration-based Attacks” [📖 - BibTex]: Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, and Fareed Zaffar, In Proc. of the 29th Network and Distributed System Security Symposium (NDSS ‘22)

  2. “Swarmbug: Debugging Configuration Bugs in Swarm Robotics” [📖 - BibTex]: Chijung Jung, Ali Ahad, Jinho Jung, Sebastian Elbaum, and Yonghwi Kwon, In Proc. of 29th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE ‘21)

  3. “Spinner: Automated Dynamic Command Subsystem Perturbation” [📖 - BibTex]: Meng Wang, Chijung Jung, Ali Ahad, and Yonghwi Kwon, In Proc. of 28th ACM Conference on Computer and Communications Security (CCS ‘21)