Search Results
BDA: Practical Dependence Analysis for Binary Executables
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
Lecture 4c. Loop-dependence analysis
SCAF - A Speculation Aware Collaborative Dependence Analysis Framework
Precise Reasoning with Structured Time, Structured Heaps, and Collective Operations
USENIX Security '17 - MPI: Multiple Perspective Attack Investigation...
USENIX Security '14 - DSCRETE: Automatic Rendering of Forensic Information from Memory Images
PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-planning
NDSS 2018 MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation
NDSS 2018 - Securing Real-Time Microcontroller Systems through Customized Memory View Switching
NDSS 2021 ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Inst...
NDSS 2021 C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis