Name
Affiliation
Papers
TIFFANY BAO
Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
19
Collaborators
Citations 
PageRank 
71
64
8.17
Referers 
Referees 
References 
242
194
59
Search Limit
100242
Title
Citations
PageRank
Year
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers00.342022
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability00.342022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing00.342022
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits00.342022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs00.342022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing10.382021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases10.352021
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)00.342021
SyML - Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.00.342021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service00.342021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing20.392020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.00.342020
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization30.452020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems50.462020
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues40.452019
Understanding and Predicting Private Interactions in Underground Forums.10.352019
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games00.342017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits80.762017
BYTEWEIGHT: learning to recognize functions in binary code391.222014