Automatic exploit generation T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley Communications of the ACM 57 (2), 74-84, 2014 | 598 | 2014 |
Towards automated dynamic analysis for linux-based embedded firmware. DD Chen, M Woo, D Brumley, M Egele NDSS 1, 1.1-8.1, 2016 | 495 | 2016 |
The art, science, and engineering of fuzzing: A survey VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo IEEE Transactions on Software Engineering 47 (11), 2312-2331, 2019 | 483 | 2019 |
{BYTEWEIGHT}: Learning to recognize functions in binary code T Bao, J Burket, M Woo, R Turner, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 845-860, 2014 | 338 | 2014 |
Program-adaptive mutational fuzzing SK Cha, M Woo, D Brumley 2015 IEEE Symposium on Security and Privacy, 725-741, 2015 | 331 | 2015 |
Blanket execution: Dynamic similarity testing for program binaries and components M Egele, M Woo, P Chapman, D Brumley 23rd USENIX Security Symposium (USENIX Security 14), 303-317, 2014 | 258 | 2014 |
Scheduling black-box mutational fuzzing M Woo, SK Cha, S Gottlieb, D Brumley Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 251 | 2013 |
Native x86 decompilation using {Semantics-Preserving} structural analysis and iterative {Control-Flow} structuring D Brumley, JH Lee, EJ Schwartz, M Woo 22nd USENIX Security Symposium (USENIX Security 13), 353-368, 2013 | 190 | 2013 |
Towards automatic software lineage inference J Jang, M Woo, D Brumley 22nd USENIX Security Symposium (USENIX Security 13), 81-96, 2013 | 118 | 2013 |
Dynamizing static algorithms, with applications to dynamic trees and history independence UA Acar, GE Blelloch, R Harper, JL Vittes, SLM Woo Carnegie Mellon University, 2004 | 100 | 2004 |
Fuzzing: Art, science, and engineering VJM Manes, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo arXiv preprint arXiv:1812.00140, 2018 | 60 | 2018 |
Scaling up DPLL (T) string solvers using context-dependent simplification A Reynolds, M Woo, C Barrett, D Brumley, T Liang, C Tinelli International Conference on Computer Aided Verification, 453-474, 2017 | 49 | 2017 |
Confronting hardness using a hybrid approach V Vassilevska, R Williams, SLM Woo Symposium on Discrete Algorithms: Proceedings of the seventeenth annual ACM …, 2006 | 45 | 2006 |
Finding effective support-tree preconditioners BM Maggs, GL Miller, O Parekh, R Ravi, SLM Woo Proceedings of the seventeenth annual ACM symposium on Parallelism in …, 2005 | 33 | 2005 |
Establishing Software Root of Trust Unconditionally. VD Gligor, SLM Woo NDSS, 2019 | 32 | 2019 |
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 25 | 2019 |
The art, science, and engineering of fuzzing: A survey VJM Manes, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo arXiv preprint arXiv:1812.00140, 2018 | 25 | 2018 |
Space-efficient finger search on degree-balanced search trees GE Blelloch, BM Maggs, SLM Woo Symposium on Discrete Algorithms: Proceedings of the fourteenth annual ACM …, 2003 | 23 | 2003 |
Fuzzing: Art VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo Science, and Engineering. CoRR abs/1812.00140 (2018), 2018 | 19 | 2018 |
Solving symmetric diagonally-dominant systems by preconditioning BM Maggs, GL Miller, O Parekh, R Ravi, SLM Woo manuscript, 2003 | 19 | 2003 |