Author of the publication

SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.

, , , , , , , , , , and . IEEE Symposium on Security and Privacy, page 138-157. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neurlux: dynamic malware analysis without feature engineering., , , , , and . ACSAC, page 444-455. ACM, (2019)Token-Level Fuzzing., , , , and . CoRR, (2023)Mechanical Phish: Resilient Autonomous Hacking., , , , , , , , , and 4 other author(s). IEEE Secur. Priv., 16 (2): 12-22 (2018)Token-Level Fuzzing., , , , and . USENIX Security Symposium, page 2795-2809. USENIX Association, (2021)Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance., , , , , , and . CCS, page 347-362. ACM, (2017)SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 138-157. IEEE Computer Society, (2016)Piston: Uncooperative Remote Runtime Patching., , , , and . ACSAC, page 141-153. ACM, (2017)DIFUZE: Interface Aware Fuzzing for Kernel Drivers., , , , , , and . CCS, page 2123-2138. ACM, (2017)Driller: Augmenting Fuzzing Through Selective Symbolic Execution., , , , , , , , and . NDSS, The Internet Society, (2016)Exploring Abstraction Functions in Fuzzing., , , , , and . CNS, page 1-9. IEEE, (2020)