Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
Creating Human Readable Path Constraints from Symbolic Execution
Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)
Read MoreUnderstanding MPU Usage in Microcontroller-based Systems in the Wild
Wei Zhou, Zhouqi Jiang (School of Cyber Science and Engineering, Huazhong University of Science and Technology), Le Guan (School of Computing, University of Georgia)
Read MoreFCGAT: Interpretable Malware Classification Method using Function Call Graph...
Minami Someya (Institute of Information Security), Yuhei Otsubo (National Police Academy), Akira Otsuka (Institute of Information Security)
Read MoreTowards Better CFG Layouts
Jack Royer (CentraleSupélec), Frédéric TRONEL (CentraleSupélec, Inria, CNRS, University of Rennes), Yaëlle Vinçont (Univ Rennes, Inria, CNRS, IRISA)
Read More