Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud M Yao, R Zhang, H Xu, R Chou, VC Paturi, AK Sikder, B Saltaformaggio Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P '24), 2024 | 1 | 2024 |
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images D Oygenblik, C Yagemann, J Zhang, A Mastali, J Park, B Saltaformaggio Proceedings of the 33rd USENIX Security Symposium (Security '24), 2024 | | 2024 |
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware H Xu, M Yao, R Zhang, MM Dawoud, J Park, B Saltaformaggio Proceedings of the 33rd USENIX Security Symposium (Security '24), 2024 | | 2024 |
Invited Tutorial: Counteracting Web Application Abuse in Malware M Yao, J Fuller, RP Sridhar, S Agarwal, AK Sikder, B Saltaformaggio 2023 IEEE Secure Development Conference (SecDev), 2023 | | 2023 |
Provenance Inference for Advanced CMS-Targeting Attacks RP Kasturi, BD Saltaformaggio US Patent App. 17/801,686, 2023 | | 2023 |
Forecasting Malware Capabilities from Cyber Attack Memory Images M Ike, O Alrawi, BD Saltaformaggio US Patent App. 17/735,443, 2023 | | 2023 |
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware M Yao, J Fuller, RP Kasturi, S Agarwal, AK Sikder, B Saltaformaggio Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23 …, 2023 | 3 | 2023 |
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning C Yagemann, SP Chung, B Saltaformaggio, W Lee Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23), 823-840, 2023 | 3 | 2023 |
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces RP Kasturi, J Fuller, Y Sun, O Chabklo, A Rodriguez, J Park, ... Proceedings of the 31st USENIX Security Symposium (USENIX Security '22), 161-178, 2022 | 17 | 2022 |
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis C Yagemann, SP Chung, B Saltaformaggio, W Lee Proceedings of the 28th ACM Conference on Computer and Communications …, 2021 | 16 | 2021 |
C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration J Fuller, RP Kasturi, A Sikder, H Xu, B Arik, V Verma, E Asdar, ... Proceedings of the 28th ACM Conference on Computer and Communications …, 2021 | 9 | 2021 |
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems Q Gu, D Formby, S Ji, B Saltaformaggio, A Bourgeois, R Beyah IEEE Transactions on Dependable and Secure Computing 19 (5), 3218-3230, 2021 | 2 | 2021 |
Modeling Large-Scale Manipulation in Open Stock Markets C Yagemann, PH Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee IEEE Security & Privacy 19 (6), 58-65, 2021 | 3 | 2021 |
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages R Duan, O Alrawi, RP Kasturi, R Elder, B Saltaformaggio, W Lee Proceedings of the 2021 Annual Network and Distributed System Security …, 2021 | 127* | 2021 |
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems C Yagemann, M Pruett, SP Chung, K Bittick, B Saltaformaggio, W Lee Proceedings of the 30th USENIX Security Symposium (USENIX Security '21 …, 2021 | 29 | 2021 |
Forecasting Malware Capabilities From Cyber Attack Memory Images O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua, T Hirani, B Hill, ... Proceedings of the 30th USENIX Security Symposium (USENIX Security '21 …, 2021 | 27 | 2021 |
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks RP Kasturi, Y Sun, R Duan, O Alrawi, E Asdar, V Zhu, Y Kwon, ... Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland '20), 2020 | 21 | 2020 |
On the Feasibility of Automating Stock Market Manipulation C Yagemann, SP Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee Proceedings of the 2020 Annual Computer Security Applications Conference …, 2020 | 12 | 2020 |
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee Proceedings of the 2019 Annual Network and Distributed System Security …, 2019 | 62 | 2019 |
The Betrayal at Cloud City: An Empirical Analysis of Cloud-Based Mobile Backends O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio Proceedings of the 28th USENIX Security Symposium (Security '19), 551-566, 2019 | 32 | 2019 |