Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Proceedings of the 20th USENIX Security Symposium, 2011
Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010
HookScout: Proactive Binary-Centric Hook Detection.
Proceedings of the Detection of Intrusions and Malware, 2010
Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008
Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007
Design space and analysis of worm defense strategies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006