Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
Symbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read MoreAccurate Compiler and Optimization Independent Function Identification Using Program...
Derrick McKee (Purdue University), Nathan Burow (MIT Lincoln Laboratory), Mathias Payer (EPFL)
Read MoreLibAFL QEMU: A Library for Fuzzing-oriented Emulation
Romain Malmain (EURECOM), Andrea Fioraldi (EURECOM), Aurelien Francillon (EURECOM)
Read MoreQSynth – A Program Synthesis based approach for Binary...
Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
Read More