Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 37 ) ) ) [post__not_in] => Array ( [0] => 6066 ) )Efficient Normalized Reduction and Generation of Equivalent Multivariate Binary...
Arnau Gàmez-Montolio (City, University of London; Activision Research), Enric Florit (Universitat de Barcelona), Martin Brain (City, University of London), Jacob M. Howe (City, University of London)
Read MoreHow Different Tokenization Algorithms Impact LLMs and Transformer Models...
Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
Read MoreIs Your Firmware Real or Re-Hosted? A case study...
Abraham A. Clements, Logan Carpenter, William A. Moeglein (Sandia National Laboratories), Christopher Wright (Purdue University)
Read MoreSymbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read More