Enforcing unique code target property for control-flow integrity H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 137 | 2018 |
{ARCUS}: symbolic root cause analysis of exploits in production systems C Yagemann, M Pruett, SP Chung, K Bittick, B Saltaformaggio, W Lee 30th USENIX Security Symposium (USENIX Security 21), 1989-2006, 2021 | 29 | 2021 |
Automated bug hunting with data-driven symbolic root cause analysis C Yagemann, SP Chung, B Saltaformaggio, W Lee Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 16 | 2021 |
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces C Yagemann, S Sultana, L Chen, W Lee Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 16 | 2019 |
VulChecker: Graph-based Vulnerability Localization in Source Code Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ... | 14 | 2023 |
Validating the integrity of audit logs against execution repartitioning attacks C Yagemann, MA Noureddine, WU Hassan, S Chung, A Bates, W Lee Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 12 | 2021 |
On the feasibility of automating stock market manipulation C Yagemann, SP Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 12 | 2020 |
Intentio ex machina: Android intent access control via an extensible application hook C Yagemann, W Du Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 10 | 2016 |
Cryptographic key derivation from biometric inferences for remote authentication E Uzun, C Yagemann, S Chung, V Kolesnikov, W Lee Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 9 | 2021 |
Intent firewall C Yagemann URL: http://www. cis. syr. edu/~ wedu/androi d/IntentFirewall, 2015 | 8 | 2015 |
MLsploit: a framework for interactive experimentation with adversarial machine learning research N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ... Proc. of the 25th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2019 | 5 | 2019 |
Privacy preserving face-based authentication PH Chung, W Lee, E Uzun, C Yagemann US Patent 11,494,476, 2022 | 4 | 2022 |
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning C Yagemann, SP Chung, B Saltaformaggio, W Lee | 3 | 2023 |
Modeling large-scale manipulation in open stock markets C Yagemann, PH Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee IEEE Security & Privacy 19 (6), 58-65, 2021 | 3 | 2021 |
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis. L Chen, C Yagemann, E Downing CVPR Workshops, 48-52, 2019 | 3 | 2019 |
Privacy preserving face-based authentication PH Chung, W Lee, E Uzun, C Yagemann US Patent 11,874,911, 2024 | | 2024 |
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating MS Anwar, C Zuo, C Yagemann, Z Lin Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | | 2023 |
Hardware-Assisted Processor Tracing for Automated Bug Finding and Exploit Prevention. C Yagemann Georgia Institute of Technology, Atlanta, GA, USA, 2022 | | 2022 |
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ... Black Hat Asia 2019, 2019 | | 2019 |
Augmenting Cyber Assessment through Dynamic Malware Analyzer A Kam, M Nance, W Lee, K Park, B Sahin, C Yagemann | | 2019 |