Toward a secure crowdsourced location tracking system | 1 | 0.40 | 2021 |
ARBITRAR: User-Guided API Misuse Detection | 0 | 0.34 | 2021 |
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses | 0 | 0.34 | 2021 |
Tarnhelm - Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. | 1 | 0.35 | 2021 |
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms | 0 | 0.34 | 2021 |
Conware: Automated Modeling of Hardware Peripherals | 1 | 0.36 | 2021 |
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices | 3 | 0.44 | 2021 |
Exploring Abstraction Functions in Fuzzing | 0 | 0.34 | 2020 |
SPIDER: Enabling Fast Patch Propagation In Related Software Repositories | 1 | 0.35 | 2020 |
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems | 1 | 0.34 | 2020 |
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware | 5 | 0.44 | 2020 |
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting | 0 | 0.34 | 2019 |
Mechanical Phish: Resilient Autonomous Hacking. | 2 | 0.39 | 2018 |
Detecting Deceptive Reviews Using Generative Adversarial Networks | 4 | 0.38 | 2018 |
Broken Fingers: On the Usage of the Fingerprint API in Android. | 2 | 0.36 | 2018 |
Dr. Checker: A Soundy Analysis For Linux Kernel Drivers | 1 | 0.35 | 2017 |
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. | 7 | 0.46 | 2017 |
Ramblr: Making Reassembly Great Again. | 9 | 0.49 | 2017 |
Bootstomp: On The Security Of Bootloaders In Mobile Devices | 4 | 0.51 | 2017 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. | 5 | 0.43 | 2017 |
CLAPP: characterizing loops in Android applications (invited talk) | 0 | 0.34 | 2015 |
CLAPP: characterizing loops in Android applications | 11 | 0.57 | 2015 |
Dynodroid: an input generation system for Android apps | 282 | 7.71 | 2013 |