Seguir
Audrey Dutcher
Audrey Dutcher
Student, Arizona State University
E-mail confirmado em rhelmot.io - Página inicial
Título
Citado por
Citado por
Ano
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
13842016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
12372016
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
HJ Tay, K Zeng, JM Vadayath, AS Raj, A Dutcher, T Reddy, W Gibbs, ...
32nd USENIX Security Symposium (USENIX Security 23), 5791-5808, 2023
132023
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning
KK Pal, AP Bajaj, P Banerjee, A Dutcher, M Nakamura, ZL Basque, ...
2024 IEEE Symposium on Security and Privacy (SP), 152-152, 2024
62024
angr: A Powerful and User-friendly Binary Analysis Platform
Y Shoshitaishvili, R Wang, A Dutcher, C Kruegel, G Vigna
en. In, 2017
12017
Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services
W Gibbs, AS Raj, JM Vadayath, HJ Tay, J Miller, A Ajayan, ZL Basque, ...
33rd USENIX Security Symposium (USENIX Security 24), 7123-7139, 2024
2024
Identifying Program Entropy Characteristics with Symbolic Execution
AA Dutcher
University of California, Santa Barbara, 2019
2019
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–8