Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
QSynth – A Program Synthesis based approach for Binary Code Deobfuscation
View More Papers
FitM: Binary-Only Coverage-GuidedFuzzing for Stateful Network Protocols
Dominik Maier, Otto Bittner, Marc Munier, Julian Beier (TU Berlin)
Read MoreFinding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MoreSymbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read MoreB2R2: Building an Efficient Front-End for Binary Analysis
Minkyu Jung (KAIST), Soomin Kim (KAIST), HyungSeok Han (KAIST), Jaeseung Choi (KAIST), Sang Kil Cha (KAIST)
Read More