SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... IEEE Symposium on Security and Privacy, 2016 | 1253 | 2016 |
Driller: Augmenting fuzzing through selective symbolic execution. N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... NDSS 16 (2016), 1-16, 2016 | 1160 | 2016 |
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware. Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna NDSS 1, 1-1, 2015 | 483 | 2015 |
T-Fuzz: fuzzing by program transformation H Peng, Y Shoshitaishvili, M Payer IEEE Security and Privacy, 2018 | 376 | 2018 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017 | 213 | 2017 |
Revolver: An automated approach to the detection of evasive web-based malware A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna 22nd USENIX Security Symposium (USENIX Security 13), 637-652, 2013 | 212 | 2013 |
Ramblr: Making Reassembly Great Again R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ... Proceedings of the Network and Distributed System Security Symposium, 2017 | 179 | 2017 |
Matched and mismatched SOCs: A qualitative study on security operations center issues FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 121 | 2019 |
Karonte: Detecting insecure multi-binary interactions in embedded firmware N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... 2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020 | 106 | 2020 |
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ... 29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020 | 101 | 2020 |
Angr-the next generation of binary analysis F Wang, Y Shoshitaishvili 2017 IEEE Cybersecurity Development (SecDev), 8-9, 2017 | 98 | 2017 |
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... 2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021 | 91 | 2021 |
Ten Years of {iCTF}: The Good, The Bad, and The Ugly G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ... 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014 | 85 | 2014 |
{HeapHopper}: Bringing bounded model checking to heap implementation security M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna 27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018 | 74 | 2018 |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits T Bao, R Wang, Y Shoshitaishvili, D Brumley IEEE Symposium on Security and Privacy, 2017 | 74 | 2017 |
{BootStomp}: On the security of bootloaders in mobile devices N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ... 26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017 | 72 | 2017 |
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ... Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017 | 71 | 2017 |
Steal this movie-automatically bypassing DRM protection in streaming media services R Wang, Y Shoshitaishvili, C Kruegel, G Vigna Proceedings of the 22nd USENIX conference on Security, 687-702, 2013 | 71 | 2013 |
Honeyplc: A next-generation honeypot for industrial control systems E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 69 | 2020 |
Blacksheep: Detecting compromised hosts in homogeneous crowds A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 61 | 2012 |