Follow
Jessie Grosen
Title
Cited by
Cited by
Year
(State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
1382*2016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
Proceedings of the Network and Distributed System Security Symposium, 2016
12312016
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the 24th Annual Symposium on Network and Distributed System …, 2017
1922017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Automatic Amortized Resource Analysis with Regular Recursive Types
J Grosen, DM Kahn, J Hoffmann
2023 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-14, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–5