Filter by type:

Toward the Analysis of Embedded Firmware through Automated Re-hosting


Evolutionary Computation for Improving Malware Analysis

Details PDF BibTeX

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

Details PDF Slides BibTeX

Systems and Methods for Single Device Authentication

Details Patent

DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers

Details PDF Slides Video Code BibTeX

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

Details PDF Video Code BibTeX

SoK: Privacy on Mobile Devices – It’s Complicated

Details PDF Video BibTeX

Towards Transparent Introspection

Details PDF BibTeX

LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis

Details PDF Code BibTeX

Using Open-source Hardware to Support Disadvantaged Communications

Details PDF Code BibTeX

Live Disk Forensics on Bare Metal

Details Slides Code

Discovering Access-control Misconfigurations: New Approaches and Evaluation Methodologies

Details PDF BibTeX

Practical Misconfiguration Identification in Access-Control Systems

Details PDF BibTeX

Making peer-assisted content distribution robust to collusion using bandwidth puzzles

Details PDF BibTeX