SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... IEEE Symposium on Security and Privacy, 2016 | 1265 | 2016 |
Driller: Augmenting fuzzing through selective symbolic execution. N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... NDSS 16 (2016), 1-16, 2016 | 1165 | 2016 |
Difuze: Interface aware fuzzing for kernel drivers J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 214 | 2017 |
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ... NDSS, 2017 | 141 | 2017 |
Neurlux: dynamic malware analysis without feature engineering C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 73 | 2019 |
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 72 | 2017 |
Mechanical phish: Resilient autonomous hacking Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ... IEEE Security & Privacy 16 (2), 12-22, 2018 | 28 | 2018 |
Token-Level Fuzzing C Salls, C Jindal, J Corina, C Kruegel, G Vigna 30th USENIX Security Symposium (USENIX Security 21), 2795–2809, 2021 | 17 | 2021 |
Exploring abstraction functions in fuzzing C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 11 | 2020 |
Piston: Uncooperative remote runtime patching C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 7 | 2017 |
Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox! C Salls | 6 | 2017 |
Neurlux C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna Proceedings of the 35th Annual Computer Security Applications Conference, 2019 | 1 | 2019 |
Fuzzing and Symbolic Execution to Identify and Patch Bugs CA Salls University of California, Santa Barbara, 2020 | | 2020 |
DIFUZE J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | | 2017 |
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ... Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016 | | 2016 |
Mechanical Phish: Resilient Autonomous Hacking A Cama, J Corbetta, P Grosen, A Machiry, C Salls | | |