Tim Leek

According to our database1, Tim Leek authored at least 22 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthetic Datasets for Program Similarity Research.
CoRR, 2024

On Training a Neural Network to Explain Binaries.
CoRR, 2024

2023
A Study of Multi-Factor and Risk-Based Authentication Availability.
Proceedings of the 32nd USENIX Security Symposium, 2023

Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

2022
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Evaluating Synthetic Bugs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2019
The Rode0day to Less-Buggy Programs.
IEEE Secur. Priv., 2019

2018
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
LAVA: Large-Scale Automated Vulnerability Addition.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Repeatable Reverse Engineering with PANDA.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
The Fun and Future of CTF.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

2013
Tappan Zee (north) bridge: mining memory accesses for introspection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Architecture-Independent Dynamic Information Flow Tracking.
Proceedings of the Compiler Construction - 22nd International Conference, 2013

2011
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2009
Taint-based directed whitebox fuzzing.
Proceedings of the 31st International Conference on Software Engineering, 2009

2004
Testing static analysis tools using exploitable buffer overflows from open source code.
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31, 2004

2000
Speech and language technologies for audio indexing and retrieval.
Proc. IEEE, 2000

1999
A Hidden Markov Model Information Retrieval System.
Proceedings of the SIGIR '99: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1999

1998
BBN at TREC7: Using Hidden Markov Models for Information Retrieval.
Proceedings of The Seventh Text REtrieval Conference, 1998


  Loading...