2023
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
AutoProfile: Towards Automated Profile Generation for Memory Analysis.
ACM Trans. Priv. Secur., 2022

Regulator: Dynamic Analysis to Detect ReDoS.
Proceedings of the 31st USENIX Security Symposium, 2022

Decomperson: How Humans Decompile and What We Can Learn From It.
Proceedings of the 31st USENIX Security Symposium, 2022

SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Advances in memory forensics. (Progrés dans l'investigation forensique de la mémoire volatile).
PhD thesis, 2019

Introducing the Temporal Dimension to Memory Forensics.
ACM Trans. Priv. Secur., 2019

Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2012
When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012