USENIX Security '15 - Automatic Generation of Data-Oriented Exploits

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection VulnerabilitiesПодробнее

USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities

USENIX Security '15 - Cache Template Attacks: Automating Attacks on Inclusive Last-Level CachesПодробнее

USENIX Security '15 - Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

Kotlin Encapsulation Simplified: Master Data Protection (Ep 13) | Beginner's Step-by-Step GuideПодробнее

Kotlin Encapsulation Simplified: Master Data Protection (Ep 13) | Beginner's Step-by-Step Guide

USENIX Security '18 - Automatic Heap Layout Manipulation for ExploitationПодробнее

USENIX Security '18 - Automatic Heap Layout Manipulation for Exploitation

USENIX Security '15 - Automatic Generation of Data-Oriented ExploitsПодробнее

USENIX Security '15 - Automatic Generation of Data-Oriented Exploits

USENIX Security '15 - Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter...Подробнее

USENIX Security '15 - Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter...

USENIX Security '24 - Practical Data-Only Attack GenerationПодробнее

USENIX Security '24 - Practical Data-Only Attack Generation

USENIX Security '24 - UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven CamouflageПодробнее

USENIX Security '24 - UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap ExploitationПодробнее

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation

USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious ExtensionsПодробнее

USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions

Automatic Exploit Generation OverviewПодробнее

Automatic Exploit Generation Overview

USENIX Security '15 - Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes...Подробнее

USENIX Security '15 - Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes...

USENIX Security '15 - EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced...Подробнее

USENIX Security '15 - EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced...

The Power of Data-Oriented AttacksПодробнее

The Power of Data-Oriented Attacks

USENIX Security '20 - Exploring Connections Between Active Learning and Model ExtractionПодробнее

USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction

USENIX Security '22 - Expected Exploitability: Predicting the Development of Functional...Подробнее

USENIX Security '22 - Expected Exploitability: Predicting the Development of Functional...

D2 Elliot - Automatic exploit generation for DefenseCodeПодробнее

D2 Elliot - Automatic exploit generation for DefenseCode