Cloud Datacenter SDN Monitoring: Experiences and Challenges. | 2 | 0.41 | 2018 |
The Mayhem Cyber Reasoning System. | 1 | 0.35 | 2018 |
The Cyber Grand Challenge and the Future of Cyber-Autonomy. | 0 | 0.34 | 2018 |
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games | 0 | 0.34 | 2017 |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits | 8 | 0.76 | 2017 |
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. | 20 | 0.76 | 2016 |
Automatically deriving pointer reference expressions from binary code for memory dump analysis | 2 | 0.38 | 2015 |
Invisible intruders: rootkits in practice | 10 | 2.21 | 2015 |
Program-Adaptive Mutational Fuzzing | 53 | 2.31 | 2015 |
PicoCTF: A Game-Based Computer Security Competition for High School Students. | 14 | 1.08 | 2014 |
Optimizing seed selection for fuzzing | 27 | 1.07 | 2014 |
BYTEWEIGHT: learning to recognize functions in binary code | 39 | 1.22 | 2014 |
Blanket execution: dynamic similarity testing for program binaries and components | 39 | 1.03 | 2014 |
Enhancing symbolic execution with veritesting | 66 | 1.88 | 2014 |
Automatic exploit generation | 35 | 1.14 | 2014 |
An empirical study of cryptographic misuse in android applications | 147 | 5.15 | 2013 |
Scheduling black-box mutational fuzzing | 38 | 1.47 | 2013 |
Automatically Inferring the Evolution of Malicious Activity on the Internet. | 4 | 0.42 | 2013 |
Towards automatic software lineage inference | 20 | 0.76 | 2013 |
TACHYON: tandem execution for efficient live patch testing | 20 | 0.61 | 2012 |
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions | 45 | 1.41 | 2012 |
GPS software attacks | 13 | 1.06 | 2012 |
Unleashing Mayhem on Binary Code | 131 | 4.97 | 2012 |
TIE: Principled Reverse Engineering of Types in Binary Programs. | 64 | 2.20 | 2011 |
AEG: Automatic Exploit Generation. | 86 | 4.12 | 2011 |
BAP: a binary analysis platform | 135 | 3.66 | 2011 |
Q: exploit hardening made easy | 81 | 3.22 | 2011 |
SplitScreen: Enabling efficient, distributed malware detection | 28 | 1.61 | 2011 |
BitShred: feature hashing malware for scalable triage and semantic analysis | 112 | 3.57 | 2011 |
Platform-independent programs | 3 | 0.64 | 2010 |
Contractual Anonymity. | 0 | 0.34 | 2010 |
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) | 228 | 7.89 | 2010 |
BitBlaze: A New Approach to Computer Security via Binary Analysis | 325 | 10.14 | 2008 |
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications | 93 | 6.24 | 2008 |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures | 13 | 1.05 | 2008 |
Creating Vulnerability Signatures Using Weakest Preconditions | 42 | 2.46 | 2007 |
Sweeper: a lightweight end-to-end system for defending against fast worms | 30 | 1.85 | 2007 |
Generic Application-Level Protocol Analyzer and its Language | 52 | 3.43 | 2007 |
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation | 56 | 4.39 | 2007 |
RICH: Automatically Protecting Against Integer-Based Vulnerabilities | 44 | 3.23 | 2007 |
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software | 44 | 2.92 | 2006 |
Towards attack-agnostic defenses | 1 | 0.48 | 2006 |
Replayer: automatic protocol replay by binary analysis | 46 | 4.35 | 2006 |
Towards Automatic Generation of Vulnerability-Based Signatures | 156 | 9.60 | 2006 |
Design space and analysis of worm defense strategies | 10 | 0.70 | 2006 |
Remote timing attacks are practical | 388 | 20.44 | 2005 |
Privtrans: automatically partitioning programs for privilege separation | 69 | 4.38 | 2004 |
Virtual Appliances for Deploying and Maintaining Software | 100 | 8.04 | 2003 |
A CrashCourse in Managing Security. | 0 | 0.34 | 2001 |
Repeatable Security. | 0 | 0.34 | 2000 |