2024
Synthetic Datasets for Program Similarity Research.
CoRR, 2024

2022
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2016
LAVA: Large-Scale Automated Vulnerability Addition.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

Repeatable Reverse Engineering with PANDA.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2013
Architecture-Independent Dynamic Information Flow Tracking.
Proceedings of the Compiler Construction - 22nd International Conference, 2013

2010
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010