Chad Spensky
Chad Spensky
Computer Security Research, UC Santa Barabara
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
AU Machiry, ED Gustafson, CU Spensky, CU Salls, NU Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
472016
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th {USENIX} Security Symposium ({USENIX} Security 17), 1007-1024, 2017
372017
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
322016
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
302016
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
NDSS, 2019
142019
Discovering access-control misconfigurations: new approaches and evaluation methodologies
L Bauer, Y Liang, MK Reiter, C Spensky
Proceedings of the second ACM conference on Data and Application Security …, 2012
142012
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
132016
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
International Conference on Information Systems Security, 132-147, 2009
112009
Systems and methods for single device authentication
H Hu, CS Spensky
US Patent App. 15/178,320, 2017
92017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
62019
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware …
D Song, F Hetzelt, D Das, C Spensky
2019 Network and Distributed Systems Security Symposium (NDSS). Internet Society, 2019
52019
Using open-source hardware to support disadvantaged communications
A Weinert, H Hu, C Spensky, B Bullough
2015 IEEE Global Humanitarian Technology Conference (GHTC), 79-86, 2015
42015
The Leakage-Resilience Dilemma
BC Ward, R Skowyra, C Spensky, J Martin, H Okhravi
European Symposium on Research in Computer Security, 87-106, 2019
32019
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices
A Yerukhimovich, R Balebako, A Boustead, RK Cunningham, W Welser IV, ...
Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States, 2016
32016
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019
22019
TRUST. IO: Protecting Physical Interfaces on Cyber-physical Systems
C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna
Proc. IEEE Conference on Communications and Network Security (CNS 2020 …, 2020
12020
Making contribution-aware peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
Technical Report CMU-CS-09-136, Carnegie Mellon University, 2009
12009
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
2020
Practical Misconfiguration Identification in Access-Control Systems
C Spensky
2010
Bluetooth Security Analysis
C Spensky
2009
The system can't perform the operation now. Try again later.
Articles 1–20