(State of) The Art of War: Offensive Techniques in Binary Analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... IEEE Symposium on Security and Privacy, 2016 | 1390* | 2016 |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... Proceedings of the Network and Distributed System Security Symposium, 2016 | 1232 | 2016 |
Ramblr: Making Reassembly Great Again R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ... Proceedings of the 24th Annual Symposium on Network and Distributed System …, 2017 | 194 | 2017 |
Mechanical phish: Resilient autonomous hacking Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ... IEEE Security & Privacy 16 (2), 12-22, 2018 | 30 | 2018 |
Automatic Amortized Resource Analysis with Regular Recursive Types J Grosen, DM Kahn, J Hoffmann 2023 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-14, 2023 | 5 | 2023 |