Folgen
Jessie Grosen
Jessie Grosen
Bestätigte E-Mail-Adresse bei cs.cmu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
(State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
1390*2016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
Proceedings of the Network and Distributed System Security Symposium, 2016
12322016
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the 24th Annual Symposium on Network and Distributed System …, 2017
1942017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Automatic Amortized Resource Analysis with Regular Recursive Types
J Grosen, DM Kahn, J Hoffmann
2023 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-14, 2023
52023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–5