Title |
Conference |
Tags |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale |
BlackHatAsia-2020 - Virtual, Virtual |
|
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Sleak: Automating Address Space Layout Derandomization |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
Neurlux: Dynamic Malware Analysis Without Feature Engineering |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
Toward the Analysis of Embedded Firmware through Automated Re-hosting |
RAID2019-2019 - Beijing, China |
|
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images |
CODASPY2019-2019 - Dallas, United States |
|
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images |
CODASPY2019-2019 - Dallas, United States |
|
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks |
27thUsenixSecuritySymposium-2018 - Vancouver, Canada |
|
Broken Fingers: On the Usage of the Fingerprint API in Android. |
NDSS-2018 - san diego,usa |
|
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. |
NDSS-2018 - san diego,usa |
|
BootStomp: On the Security of Bootloaders in Mobile Devices |
usenixsecurity-2017 - vancouver,canada |
|
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers |
usenixsecurity-2017 - vancouver,canada |
|
Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis |
NDSS-2017 - california,usa |
|
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments |
NDSS-2017 - california,usa |
|
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING |
BlackHatEU-2016 - London,uk |
|
Driller: Augmenting Fuzzing Through Selective Symbolic Execution |
NDSS-2016 - california,usa |
|
Know Your Achilles' Heel: Automatic Detection of Network Critical Services |
ACSAC-2015 - los angeles,usa |
|
BareDroid: Large-Scale Analysis of Android Apps on Real Devices |
ACSAC-2015 - los angeles,usa |
|
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications |
ACSAC-2015 - los angeles,usa |
|
EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services |
SecuritySymposium-2015 - washington,USA |
|
Meerkat: Detecting Website Defacements through Image-based Object Recognition |
SecuritySymposium-2015 - washington,USA |
|
How the ELF Ruined Christmas |
SecuritySymposium-2015 - washington,USA |
|
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities |
SecuritySymposium-2015 - washington,USA |
|
USING STATIC BINARY ANALYSIS TO FIND VULNERABILITIES AND BACKDOORS IN FIRMWARE |
BlackhatUS-2015 - Las vegas,usa |
|
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users, |
Dimva-2015 - Milan,Italy |
|
A Large-Scale Study of Mobile Web App Security |
MOST-2015 - San Jose,USA |
|
Evasive Malware Exposed and Deconstructed |
RSAus-2015 - San Francisco,USA |
|
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework |
NDSS-2015 - san diego,usa |
|
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware |
NDSS-2015 - san diego,usa |
|
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel |
Raid-2014 - gottenburg,sweden |
|
Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection |
Raid-2014 - gottenburg,sweden |
|
BareCloud: Bare-metal Analysis-based Evasive Malware Detection |
usenix-2014 - san diego,usa |
|
Hulk: Eliciting Malicious Behavior in Browser Extensions |
usenix-2014 - san diego,usa |
|
FULL SYSTEM EMULATION: ACHIEVING SUCCESSFUL AUTOMATED DYNAMIC ANALYSIS OF EVASIVE MALWARE |
BlackHatUS-2014 - las vegas,usa |
|
PExy: The other side of Exploit Kits |
Dimva-2014 - London,UK |
|
Keynote: Fighting Malicious Code - An Eternal Struggle |
asiaccs-2014 - kyoto,japan |
|
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape |
asiaccs-2014 - kyoto,japan |
|
The Tricks of the Trade: What Makes Spam Campaigns Successful? |
IWCC-2014 - san jose,usa |
|
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications |
NDSS-2014 - San Diego,USA |
|
Nazca: Detecting Malware Distribution in Large-Scale Networks |
NDSS-2014 - San Diego,USA |
|
Message In A Bottle: Sailing Past Censorship |
ACSAC-2013 - New Orleans, USA |
|
Understanding and Fighting Evasive Malware |
RSAeu-2013 - Europaplein, Amsterdam |
|
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware |
USENIX-2013 - Washington, D.C. |
|
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services |
USENIX-2013 - Washington, D.C. |
|
B@bel: Leveraging Email Delivery for Spam Mitigation |
USENIX-2012 - Washington, D.C. |
|
PUBCRAWL: Protecting Users and Businesses from CRAWLers |
USENIX-2012 - Washington, D.C. |
|
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner |
USENIX-2012 - Washington, D.C. |
|
Escape from Monkey Island: Evading High-Interaction Honeyclients |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
Message In A Bottle: Sailing Past Censorship |
Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain |
|
The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
|
Securing Web applications |
Confrence-on-computer-communications-security-2011 - Chicago, USA |
Security
|
Escape from Monkey Island: Evading High-Interaction Honeyclients |
dimva-2011 - Amsterdam,Netherkands |
|
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) |
dimva-2011 - Amsterdam,Netherkands |
|
Toward Automated Detection Of Logic Vulnerabilities In Web Applications |
19th USENIX Security Symposium-2010 - Washington DC, USA |
Security
Web
|
Effective And Efficient Malware Detection At The End Host |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Malware
|
Malware Analysis |
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA |
Security
Analysis
Malware
|
A View On Current Malware Behaviors |
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2009 - Boston, USA |
Security
Malware
|
There Is No Free Phish: An Analysis Of Free And Live Phishing Kits |
2nd USENIX Workshop on Offensive Technologies-2008 - San Jose, USA |
Security
Analysis
Phishing
|
Behavior-Based Spyware Detection |
15th USENIX Security Symposium-2006 - Vancouver, Canada |
Security
|
Automating Mimicry Attacks Using Static Binary Analysis |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
Analysis
|
Static Disassembly Of Obfuscated Binaries |
13th USENIX Security Symposium-2004 - San Diego, USA |
Security
|