Search Results
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
USENIX Security '14 - DSCRETE: Automatic Rendering of Forensic Information from Memory Images
USENIX Security '20 - Horizontal Privilege Escalation in Trusted Applications
USENIX Security '15 - SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
USENIX Security '17 - Hacking in Darkness: Return-oriented Programming against Secure Enclaves
USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries
USENIX Security '20 - SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
USENIX Security '19 - RAZOR: A Framework for Post-deployment Software Debloating
BDA: Practical Dependence Analysis for Binary Executables
Moabi Research - Post Memory Corruption Memory Analysis - Blackhat 2011
2014-12-10 CERIAS - How Program Analysis can be Used in Security Applications