Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
Details
PDF
Code
SYMBION: Interleaving Symbolic with Concrete Execution
Details
PDF
Toward the Analysis of Embedded Firmware through Automated Re-hosting
Details
PDF
Code
Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools
Details
PDF
Code
Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
Details
PDF
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations
Details
PDF
Exploitation and mitigation of authentication schemes based on device-public information
Details
PDF
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
Details
PDF
Video
Code