Seguir
Jessie Grosen
Título
Citado por
Citado por
Ano
(State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
1384*2016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
Proceedings of the Network and Distributed System Security Symposium, 2016
12322016
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the 24th Annual Symposium on Network and Distributed System …, 2017
1922017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Automatic Amortized Resource Analysis with Regular Recursive Types
J Grosen, DM Kahn, J Hoffmann
2023 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-14, 2023
52023
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–5