Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE symposium on security and privacy (SP), 138-157, 2016 | 1384 | 2016 |
Driller: Augmenting fuzzing through selective symbolic execution. N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... NDSS 16 (2016), 1-16, 2016 | 1237 | 2016 |
Mechanical phish: Resilient autonomous hacking Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ... IEEE Security & Privacy 16 (2), 12-22, 2018 | 30 | 2018 |
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation HJ Tay, K Zeng, JM Vadayath, AS Raj, A Dutcher, T Reddy, W Gibbs, ... 32nd USENIX Security Symposium (USENIX Security 23), 5791-5808, 2023 | 13 | 2023 |
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning KK Pal, AP Bajaj, P Banerjee, A Dutcher, M Nakamura, ZL Basque, ... 2024 IEEE Symposium on Security and Privacy (SP), 152-152, 2024 | 6 | 2024 |
angr: A Powerful and User-friendly Binary Analysis Platform Y Shoshitaishvili, R Wang, A Dutcher, C Kruegel, G Vigna en. In, 2017 | 1 | 2017 |
Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services W Gibbs, AS Raj, JM Vadayath, HJ Tay, J Miller, A Ajayan, ZL Basque, ... 33rd USENIX Security Symposium (USENIX Security 24), 7123-7139, 2024 | | 2024 |
Identifying Program Entropy Characteristics with Symbolic Execution AA Dutcher University of California, Santa Barbara, 2019 | | 2019 |