关注
Christopher Salls
Christopher Salls
在 cs.ucsb.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
12652016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11652016
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2142017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1412017
Neurlux: dynamic malware analysis without feature engineering
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
732019
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
722017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
Token-Level Fuzzing
C Salls, C Jindal, J Corina, C Kruegel, G Vigna
30th USENIX Security Symposium (USENIX Security 21), 2795–2809, 2021
172021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
112020
Piston: Uncooperative remote runtime patching
C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
72017
Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox!
C Salls
62017
Neurlux
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
12019
Fuzzing and Symbolic Execution to Identify and Patch Bugs
CA Salls
University of California, Santa Barbara, 2020
2020
DIFUZE
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
系统目前无法执行此操作,请稍后再试。
文章 1–16