Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)
Creating Human Readable Path Constraints from Symbolic Execution
View More Papers
FitM: Binary-Only Coverage-GuidedFuzzing for Stateful Network Protocols
Dominik Maier, Otto Bittner, Marc Munier, Julian Beier (TU Berlin)
Read MoreInvestigating Graph Embedding Neural Networks with Unsupervised Features Extraction...
Luca Massarelli (Sapienza University of Rome), Giuseppe A. Di Luna (CINI - National Laboratory of Cybersecurity), Fabio Petroni (Independent Researcher), Leonardo Querzoni (Sapienza University of Rome), Roberto Baldoni (Italian Presidency of Ministry Council)
Read MoreFinding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MoreShort Paper: Declarative Demand-Driven Reverse Engineering
Yihao Sun, Jeffrey Ching, Kristopher Micinski (Department of Electical Engineering and Computer Science, Syracuse University)
Read More