Papers
1–3 of 3Research Paper·Mar 9, 2026
Lockbox -- A Zero Trust Architecture for Secure Processing of Sensitive Cloud Workloads
Enterprises increasingly rely on cloud-based applications to process highly sensitive data artifacts. Although cloud adoption improves agility and scalability, it also introduces new security challeng...
4.0 viability
Research Paper·Mar 10, 2026
Paladin: A Policy Framework for Securing Cloud APIs by Combining Application Context with Generative AI
Enterprises and organizations today increasingly deploy in-house, cloud based applications and APIs for internal operations or external customers. These deployments deal with increasing number of thre...
3.0 viability
Research Paper·Mar 16, 2026
vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint Auditing
In cloud-based endpoint auditing, security administrators often rely on the cloud to perform causality analysis over log-derived versioned provenance graphs to investigate suspicious attack behaviors....
2.0 viability