Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
DITTANY: Strength-Based Dynamic Information Flow Analysis Tool for x86...
Walid J. Ghandour, Clémentine Maurice (CNRS, CRIStAL)
Read MoreDRAGON: Predicting Decompiled Variable Data Types with Learned Confidence...
Caleb Stewart, Rhonda Gaede, Jeffrey Kulick (University of Alabama in Huntsville)
Read MoreEfficient Normalized Reduction and Generation of Equivalent Multivariate Binary...
Arnau Gàmez-Montolio (City, University of London; Activision Research), Enric Florit (Universitat de Barcelona), Martin Brain (City, University of London), Jacob M. Howe (City, University of London)
Read MoreTarget-Centric Firmware Rehosting with Penguin
Andrew Fasano, Zachary Estrada, Luke Craig, Ben Levy, Jordan McLeod, Jacques Becker, Elysia Witham, Cole DiLorenzo, Caden Kline, Ali Bobi (MIT Lincoln Laboratory), Dinko Dermendzhiev (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), William Robertson (Northeastern University)
Read More