关注
Audrey Dutcher
Audrey Dutcher
Student, Arizona State University
在 rhelmot.io 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
13122016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11892016
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
292018
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
HJ Tay, K Zeng, JM Vadayath, AS Raj, A Dutcher, T Reddy, W Gibbs, ...
32nd USENIX Security Symposium (USENIX Security 23), 5791-5808, 2023
92023
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning
KK Pal, AP Bajaj, P Banerjee, A Dutcher, M Nakamura, ZL Basque, ...
2024 IEEE Symposium on Security and Privacy (SP), 152-152, 2024
52024
Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services
W Gibbs, AS Raj, JM Vadayath, HJ Tay, J Miller, A Ajayan, ZL Basque, ...
33rd USENIX Security Symposium (USENIX Security 24), 7123-7139, 2024
2024
angr: A Powerful and User-friendly Binary Analysis Platform
Y Shoshitaishvili, R Wang, A Dutcher, C Kruegel, G Vigna
2023
Identifying Program Entropy Characteristics with Symbolic Execution
AA Dutcher
University of California, Santa Barbara, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–8