Author of the publication

BYTEWEIGHT: Learning to Recognize Functions in Binary Code.

, , , , and . USENIX Security Symposium, page 845-860. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic exploit generation., , , , , and . Commun. ACM, 57 (2): 74-84 (2014)The Art, Science, and Engineering of Fuzzing: A Survey., , , , , , and . IEEE Trans. Software Eng., 47 (11): 2312-2331 (2021)BYTEWEIGHT: Learning to Recognize Functions in Binary Code., , , , and . USENIX Security Symposium, page 845-860. USENIX Association, (2014)Requirements for Root of Trust Establishment., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 192-202. Springer, (2018)ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions., , and . login Usenix Mag., (2012)Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification., , , , , and . CAV (2), volume 10427 of Lecture Notes in Computer Science, page 453-474. Springer, (2017)Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components., , , and . USENIX Security Symposium, page 303-317. USENIX Association, (2014)Mutual Embeddings., , , , and . J. Interconnect. Networks, 15 (1-2): 1550001:1-1550001:27 (2015)Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring., , , and . USENIX Security Symposium, page 353-368. USENIX Association, (2013)Program-Adaptive Mutational Fuzzing., , and . IEEE Symposium on Security and Privacy, page 725-741. IEEE Computer Society, (2015)