Smartnic performance isolation with fairnic: Programmable networking for the cloud S Grant, A Yelam, M Bland, AC Snoeren Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 86 | 2020 |
Jetset: Targeted firmware rehosting for embedded systems E Johnson, M Bland, YF Zhu, J Mason, S Checkoway, S Savage, ... 30th USENIX Security Symposium (USENIX Security 21), 321-338, 2021 | 68 | 2021 |
Lazy counterfactual symbolic execution WT Hallahan, A Xue, MT Bland, R Jhala, R Piskac Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019 | 21 | 2019 |
Please pay inside: Evaluating bluetooth-based detection of gas pump skimmers N Bhaskar, M Bland, K Levchenko, A Schulman 28th USENIX Security Symposium (USENIX Security 19), 373-388, 2019 | 16 | 2019 |
All eyes on me: Inside third party trackers' exfiltration of phi from healthcare providers' online systems M Huo, M Bland, K Levchenko Proceedings of the 21st Workshop on Privacy in the Electronic Society, 197-211, 2022 | 11 | 2022 |
Story beyond the eye: glyph positions break PDF text redaction M Bland, A Iyer, K Levchenko arXiv preprint arXiv:2206.02285, 2022 | 7 | 2022 |
Pestilential protocol: How unsecure hl7 messages threaten patient lives C Dameff, M Bland, K Levchenko, J Tully Blackhat USA, 2018 | 6 | 2018 |
Emulation-based security measurement with applications in avionics, redaction, and industrial control M Bland University of Illinois at Urbana-Champaign, 2023 | | 2023 |
Designing an Android Application for the Wireless Detection of Credit Card Skimmers MT Bland University of California, San Diego, 2019 | | 2019 |
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives MD Christian Dameff, M Bland, J Tully | | |