Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
QSynth – A Program Synthesis based approach for Binary Code Deobfuscation
View More Papers
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MoreRapid Vulnerability Mitigation with Security Workarounds
Zhen Huang (Pennsylvania State University), Gang Tan (Pennsylvania State University)
Read MoreTowards Automatically Generating a Sound and Complete Dataset for...
Aravind Machiry (UC Santa Barbara), Nilo Redini (UC Santa Barbara), Eric Gustafson (UC Santa Barbara), Hojjat Aghakhani (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)
Read MoreSymbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read More