Hercule: Attack story reconstruction via community discovery on correlated log graph K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 184 | 2016 |
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages R Duan, O Alrawi, RP Kasturi, R Elder, B Saltaformaggio, W Lee Proceedings of the 2021 Annual Network and Distributed System Security …, 2021 | 127* | 2021 |
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic B Saltaformaggio, H Choi, K Johnson, Y Kwon, Q Zhang, X Zhang, D Xu, ... Proceedings of the 2016 USENIX Workshop on Offensive Technologies (WOOT), 2016 | 127 | 2016 |
LDX: Causality Inference by Lightweight Dual Execution Y Kwon, D Kim, WN Sumner, K Kim, B Saltaformaggio, X Zhang, D Xu Proceedings of the 21st International Conference on Architectural Support …, 2016 | 77 | 2016 |
iRiS: Vetting Private API Abuse in iOS Applications Z Deng, B Saltaformaggio, X Zhang, D Xu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 72 | 2015 |
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee Proceedings of the 2019 Annual Network and Distributed System Security …, 2019 | 62 | 2019 |
GUITAR: Piecing together android app GUIs from memory images B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 60 | 2015 |
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 48 | 2017 |
Busmonitor: A hypervisor-based solution for memory bus covert channels B Saltaformaggio, D Xu, X Zhang Proceedings of 6th European Workshop on Systems Security (EuroSec'13, in …, 2013 | 48 | 2013 |
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III Computers & Security 73, 235-248, 2018 | 45 | 2018 |
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 45 | 2015 |
Face-Change: Application-driven dynamic kernel view switching in a virtual machine Z Gu, B Saltaformaggio, X Zhang, D Xu Proceedings of the 44th Annual IEEE/IFIP International Conference on …, 2014 | 45* | 2014 |
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse B Saltaformaggio, Z Gu, X Zhang, D Xu Proceedings of the 23rd USENIX Conference on Security Symposium, 255-269, 2014 | 42 | 2014 |
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images B Saltaformaggio, R Bhatia, X Zhang, D Xu, GG Richard III Proceedings of the 25th USENIX Security Symposium (Security '16), 2016 | 34 | 2016 |
The Betrayal at Cloud City: An Empirical Analysis of Cloud-Based Mobile Backends O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio Proceedings of the 28th USENIX Security Symposium (Security '19), 551-566, 2019 | 32 | 2019 |
Live acquisition of main memory data from Android smartphones and smartwatches SJ Yang, JH Choi, KB Kim, R Bhatia, B Saltaformaggio, D Xu Digital Investigation 23, 50-62, 2017 | 30 | 2017 |
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems C Yagemann, M Pruett, SP Chung, K Bittick, B Saltaformaggio, W Lee Proceedings of the 30th USENIX Security Symposium (USENIX Security '21 …, 2021 | 29 | 2021 |
Forecasting Malware Capabilities From Cyber Attack Memory Images O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua, T Hirani, B Hill, ... Proceedings of the 30th USENIX Security Symposium (USENIX Security '21 …, 2021 | 27 | 2021 |
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation H Lu, B Saltaformaggio, R Kompella, D Xu Proceedings of the Sixth ACM Symposium on Cloud Computing, 125-138, 2015 | 24 | 2015 |
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks RP Kasturi, Y Sun, R Duan, O Alrawi, E Asdar, V Zhu, Y Kwon, ... Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland '20), 2020 | 21 | 2020 |