Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
S. Niekum
Daniel P. Kennedy
Ren C. Luo
Dan Graur
Barbara Aquilani
Xin Zhang
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Chen Ma
Home
/
Author
/
TIFFANY BAO
Author Info
Open Visualization
Name
Affiliation
Papers
TIFFANY BAO
Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
19
Collaborators
Citations
PageRank
71
64
8.17
Referers
Referees
References
242
194
59
Search Limit
100
242
Publications (19 rows)
Collaborators (71 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers
0
0.34
2022
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability
0
0.34
2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
0
0.34
2022
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
0
0.34
2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
0
0.34
2022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
1
0.38
2021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases
1
0.35
2021
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
0
0.34
2021
SyML - Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
0
0.34
2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
0
0.34
2021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
2
0.39
2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
0
0.34
2020
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization
3
0.45
2020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
5
0.46
2020
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
4
0.45
2019
Understanding and Predicting Private Interactions in Underground Forums.
1
0.35
2019
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
0
0.34
2017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
8
0.76
2017
BYTEWEIGHT: learning to recognize functions in binary code
39
1.22
2014
1