Brendan Saltaformaggio
According to our database1,
Brendan Saltaformaggio
authored at least 40 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE Secure Development Conference, 2023
2022
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Comput. Secur., 2018
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Digit. Investig., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Convicted by memory: Automatically recovering spatial-temporal evidence from memory images
PhD thesis, 2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2011
Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011