Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
Polypyus – The Firmware Historian
Jan Friebertshauser, Florian Kosterhon, Jiska Classen, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstad)
Read MoreTrim My View: An LLM-Based Code Query System for...
Sima Arasteh (University of Southern California), Pegah Jandaghi, Nicolaas Weideman (University of Southern California/Information Sciences Institute), Dennis Perepech, Mukund Raghothaman (University of Southern California), Christophe Hauser (Dartmouth College), Luis Garcia (University of Utah Kahlert School of Computing)
Read MoreLibAFL QEMU: A Library for Fuzzing-oriented Emulation
Romain Malmain (EURECOM), Andrea Fioraldi (EURECOM), Aurelien Francillon (EURECOM)
Read MoreA Heuristic Approach to Detect Opaque Predicates that Disrupt...
Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine)
Read More