Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
AutoProfile: Towards Automated Profile Generation for Memory Analysis.
ACM Trans. Priv. Secur., 2022
Regulator: Dynamic Analysis to Detect ReDoS.
Proceedings of the 31st USENIX Security Symposium, 2022
Decomperson: How Humans Decompile and What We Can Learn From It.
Proceedings of the 31st USENIX Security Symposium, 2022
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Advances in memory forensics. (Progrés dans l'investigation forensique de la mémoire volatile).
PhD thesis, 2019
Introducing the Temporal Dimension to Memory Forensics.
ACM Trans. Priv. Secur., 2019
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012