USENIX Security '21 - MAZE: Towards Automated Heap Feng Shui

USENIX Security '21 - MAZE: Towards Automated Heap Feng ShuiПодробнее

USENIX Security '21 - MAZE: Towards Automated Heap Feng Shui

USENIX Security '17 - Towards Efficient Heap Overflow DiscoveryПодробнее

USENIX Security '17 - Towards Efficient Heap Overflow Discovery

USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...Подробнее

USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...

USENIX Security '23 - Automated Exploitable Heap Layout Generation for Heap Overflows Through...Подробнее

USENIX Security '23 - Automated Exploitable Heap Layout Generation for Heap Overflows Through...

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap ExploitationПодробнее

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation

USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side ChannelsПодробнее

USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels

USENIX Security '18 - Automatic Heap Layout Manipulation for ExploitationПодробнее

USENIX Security '18 - Automatic Heap Layout Manipulation for Exploitation

USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward AllocationПодробнее

USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward Allocation

USENIX Security '21 - ARCUS: Symbolic Root Cause Analysis of Exploits in Production SystemsПодробнее

USENIX Security '21 - ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems

USENIX Security '24 - ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata...Подробнее

USENIX Security '24 - ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata...

USENIX Security '22 - Automated Detection of Automated TrafficПодробнее

USENIX Security '22 - Automated Detection of Automated Traffic

USENIX Security '21 - Blind In/On-Path Attacks and Applications to VPNsПодробнее

USENIX Security '21 - Blind In/On-Path Attacks and Applications to VPNs

USENIX Security '24 - Navigating the Privacy Compliance Maze: Understanding Risks with...Подробнее

USENIX Security '24 - Navigating the Privacy Compliance Maze: Understanding Risks with...

USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge InferenceПодробнее

USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference

USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for BetterПодробнее

USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better

USENIX Security '24 - TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities...Подробнее

USENIX Security '24 - TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities...