Maverick Woo

Orcid: 0000-0002-0237-444X

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Maverick Woo authored at least 23 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Art, Science, and Engineering of Fuzzing: A Survey.
IEEE Trans. Software Eng., 2021

2020
1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020

On the Generation of Disassembly Ground Truth and the Evaluation of Disassemblers.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020

2019
Establishing Software Root of Trust Unconditionally.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Fuzzing: Art, Science, and Engineering.
CoRR, 2018

Requirements for Root of Trust Establishment.
Proceedings of the Security Protocols XXVI, 2018

2017
Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

2016
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Mutual Embeddings.
J. Interconnect. Networks, 2015

Program-Adaptive Mutational Fuzzing.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Automatic exploit generation.
Commun. ACM, 2014

Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

BYTEWEIGHT: Learning to Recognize Functions in Binary Code.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Towards Automatic Software Lineage Inference.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Scheduling black-box mutational fuzzing.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
login Usenix Mag., 2012

2008
Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors.
Proceedings of the 20th Annual Canadian Conference on Computational Geometry, 2008

2006
Confronting hardness using a hybrid approach.
Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2006

2005
Finding effective support-tree preconditioners.
Proceedings of the SPAA 2005: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2005

2004
Dynamizing static algorithms, with applications to dynamic trees and history independence.
Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004

2003
Space-efficient finger search on degree-balanced search trees.
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003


  Loading...