Search Results
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
USENIX Security '22 - RE-Mind: a First Look Inside the Mind of a Reverse Engineer
USENIX Security '22 - Decomperson: How Humans Decompile and What We Can Learn From It
USENIX Security '23 - AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity
USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic
USENIX Security '17 - Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
FAST '15 - Skylight—A Window on Shingled Disk Operation
USENIX Security '13 - Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
NDSS 2023 - BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats