Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
Symbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read MoreFirmLine: a Generic Pipeline for Large-Scale Analysis of Non-Linux...
Alexander Balgavy (Independent), Marius Muench (University of Birmingham)
Read MoreFirmDiff: Improving the Configuration of Linux Kernels Geared Towards...
Ioannis Angelakopoulos (Boston University), Gianluca Stringhini (Boston University), Manuel Egele (Boston University)
Read MorePerformance, Correctness, Exceptions: Pick Three
Andrea Gussoni (Politecnico di Milano), Alessandro Di Federico (Politecnico di Milano), Pietro Fezzardi (Politecnico di Milano), Giovanni Agosta (Politecnico di Milano)
Read More