Follow
Aravind Machiry
Aravind Machiry
Assistant Professor, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Dynodroid: An input generation system for android apps
A Machiry, R Tahiliani, M Naik
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
9342013
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2282017
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
1922017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1562019
{DR}.{CHECKER}: A soundy analysis for linux kernel drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th USENIX Security Symposium (USENIX Security 17), 1007-1024, 2017
1512017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1502017
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 431-448, 2020
1262020
Detecting deceptive reviews using generative adversarial networks
H Aghakhani, A Machiry, S Nilizadeh, C Kruegel, G Vigna
2018 IEEE security and privacy workshops (SPW), 89-95, 2018
1002018
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
812017
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021
722021
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
522019
SPIDER: Enabling Fast Patch Propagation in Related Software Repositories
A Machiry, N Redini, E Camellini, C Kruegel, G Vigna
2020 IEEE Symposium on Security and Privacy (SP), 512-529, 2020
482020
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
482018
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
442015
Characterizing the security of github {CI} workflows
I Koishybayev, A Nahapetyan, R Zachariah, S Muralee, B Reaves, ...
31st USENIX Security Symposium (USENIX Security 22), 2747-2763, 2022
352022
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
262021
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
262018
Teezz: Fuzzing trusted applications on cots android devices
M Busch, A Machiry, C Spensky, G Vigna, C Kruegel, M Payer
2023 IEEE Symposium on Security and Privacy (SP), 1204-1219, 2023
242023
Arbitrar: User-guided api misuse detection
Z Li, A Machiry, B Chen, M Naik, K Wang, L Song
2021 IEEE Symposium on Security and Privacy (SP), 1400-1415, 2021
242021
The system can't perform the operation now. Try again later.
Articles 1–20