Publications

Filter by type:

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

Details PDF Code

HALucinator: Firmware Re-Hosting through Abstraction Layer Emulation

Details PDF Video Code

SYMBION: Interleaving Symbolic with Concrete Execution

Details PDF

Toward the Analysis of Embedded Firmware through Automated Re-hosting

Details PDF Code

Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools

Details PDF Code

Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis

Details PDF

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations

Details PDF

Exploitation and mitigation of authentication schemes based on device-public information

Details PDF

Shell We Play A Game? CTF-as-a-service for Security Education

Details PDF Code Project

BootStomp: On the Security of Mobile Bootloaders

Details PDF Code

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

Details PDF Video Code