11/03/13 |
Our paper "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS). |
11/03/13 |
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP). |
09/22/13 |
Our paper "An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables" is to appear in the 29th IEEE International Conference on Software Maintenance (ICSM). |
08/27/13 |
Our paper "Transparent ROP Exploit Mitigation using Indirect Branch
Tracing" is to appear in the 22nd USENIX Security Symposium. |
08/12/13 |
Our paper "MINESTRONE: Testing the SOUP" is to appear in the 6th Workshop on Cyber Security Experimentation and Test (CSET). |
07/08/13 |
Our paper "Expression Reduction from Programs in a Symbolic Binary
Executor" is to appear in the 19th International SPIN Symposium on Model Checking of
Software. |
06/24/13 |
Our paper "Determinism Is Overrated: What Really Makes Multithreaded Programs Hard
to Get Right and What Can Be Done about It" is to appear in the 5th USENIX Workshop on Hot Topics in Parallelism (HOTPAR). |
06/24/13 |
Our paper "Redundant State Detection for Dynamic Symbolic Execution" is to appear in the USENIX Annual Technical Conference (ATC). |
11/04/12 |
Our paper "Verifying Systems Rules Using Rule-Directed Symbolic
Execution" is to appear in the 18th International Conference on Architecture Support
for Programming Languages and Operating Systems (ASPLOS). |
08/17/12 |
Our paper "Self-healing Multitier Architectures Using Cascading Rescue
Points" is to appear in the 2012 Annual Computer Security
Applications Conference (ACSAC). |
07/10/12 |
Our paper "Adaptive Defenses for Commodity Software through Virtual
Application Partitioning" is to appear in the 19th ACM Conference on Computer and
Communications Security (CCS). |
07/03/12 |
Our paper "Practical Software Diversification Using In-Place Code Randomization
" is to appear in the Moving Target Defense II: Application of Game Theory and Adversarial Modeling. |
06/01/12 |
Our paper "A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems" is to appear in the International Conference on Dependable Systems and Networks (IEEE DSN). |
04/23/12 |
Our paper "kGuard: Lightweight Kernel Protection against Return-to-user
Attacks" is to appear in the 21st USENIX Security Symposium. |
04/02/12 |
Our paper "Concurrency Attacks" is to appear in the 4th USENIX Workshop on Hot Topics in Parallelism
(HotPar). |
02/01/12 |
Our paper "Sound and Precise Analysis of Multithreaded Programs through
Schedule Specialization" is to appear in the Conference on Programming Language Design and
Implementation (PLDI). |
02/01/12 |
Our paper "Smashing the Gadgets: Hindering Return-Oriented Programming Using
In-Place Code Randomization" is to appear in the IEEE Symposium on Security & Privacy
(S&P). |
12/19/11 |
Our paper "libdft: Practical Dynamic Data Flow Tracking for Commodity
Systems" is to appear in the International Conference on Virtual Execution
Environments (VEE). |
12/03/11 |
Our paper "SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted
and Untrusted Commodity OSes" is to appear in the Annual Network and Distributed System Security Symposium
(NDSS). |
10/20/11 |
Our paper "A General Approach for Efficiently Accelerating Software-based
Dynamic Data Flow Tracking on Commodity Hardware" is to appear in the Annual Network and Distributed System Security Symposium
(NDSS). |
09/15/11 |
Our paper "ROP Payload Detection Using Speculative Code Execution" is to appear in the International Conference on Malicious and Unwanted
Software (MALWARE). |
09/06/11 |
Our paper "From Prey To Hunter: Transforming Legacy Embedded Devices Into
Exploitation Sensor Grids" is to appear in the Annual Computer Security Applications Conference (ACSAC). |
08/02/11 |
Our paper "Killing the Myth of Cisco IOS Diversity: Recent Advances in
Reliable Shellcode Design " is to appear in the 2011 USENIX Workshop on Offensive Technology
(WOOT). |
07/11/11 |
Our paper "Taint-Exchange: a Generic System for Cross-process and Cross-host
Taint Tracking" is to appear in the 6th International Workshop on Security
(IWSEC2011). |
07/11/11 |
Our paper "REASSURE: A Self-contained Mechanism for Healing Software Using
Rescue Points" is to appear in the 6th International Workshop on Security
(IWSEC2011). |
07/05/11 |
Our paper "Efficient Deterministic Multithreading through Schedule
Relaxation" is to appear in the 23rd ACM Symposium on Operating Systems (SOSP). |
07/05/11 |
Our paper "Pervasive Detection of Process Races in Deployed Systems" is to appear in the 23rd ACM Symposium on Operating Systems (SOSP). |
06/05/11 |
Our paper "DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
" is to appear in the IEEE Journal on Transactions on Dependable and Secure
Computing (TDSC). |
06/03/11 |
Our paper "Defending Legacy Embedded Systems with Software Symbiotes
" is to appear in the 14th International Symposium on Recent Advances in
Intrusion Detection (RAID). |
06/03/11 |
Our paper "Finding Concurrency Errors in Sequential Code---OS-level, In-vivo
Model Checking of Process Races " is to appear in the 13th Workshop on Hot Topics in Operating Systems
(HotOS XIII). |
05/23/11 |
Our paper "Practical Software Model Checking via Dynamic Interface
Reduction" is to appear in the 23rd ACM Symposium on Operating Systems
Principles (SOSP). |
05/10/11 |
Our paper "The MINESTRONE Architecture: Combining Static and Dynamic
Analysis Techniques for Software Security (Research roadmap
paper)" is to appear in the 1st SysSec Workshop. |
05/05/11 |
Our paper "Firmware-assisted Memory Acquisition and Analysis tools for
Digital Forensic (short paper)" is to appear in the 6th International Workshop on Systematic Approaches to
Digital Forensic Engineering (IEEE SADFE 2011). |
03/30/11 |
Our paper "Practical, low-effort equivalence verification of real
code" is to appear in the 23rd International Conference on Computer Aided
Verification (CAV). |
01/27/11 |
Our paper "Retrofitting Security in COTS Software with Binary
Rewriting" is to appear in the 26th IFIP International Information Security Conference
(SEC). |
12/18/10 |
Our paper "Global ISR: Toward a Comprehensive Defense Against
Unauthorized Code Execution" is to appear in the ARO Workshop. |
08/16/10 |
Our paper "Fast and Practical Instruction-Set Randomization for Commodity
Systems " is to appear in the Annual Computer Security Applications Conference (ACSAC). |
08/01/10 |
Our paper "Stable Deterministic Multithreading through Schedule
Memoization" is to appear in the 9th USENIX Symposium on Operating Systems Design and
Implementation (OSDI). |
08/01/10 |
Our paper "Bypassing Races in Live Applications with Execution
Filters" is to appear in the 9th USENIX Symposium on Operating Systems Design and
Implementation (OSDI). |
11/30/99 |
Our paper "The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines" is to appear in the Network and Distributed System Security (NDSS) Symposium. |
11/30/99 |
Our paper "IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking" is to appear in the Annual Computer Security Applications Conference (ACSAC). |
11/30/99 |
Our paper "Large-Scale Evaluation of a Vulnerability Analysis Framework" is to appear in the Workshop on Cyber Security Experimentation and Test (CSET). |
11/30/99 |
Our paper "Dynamic Reconstruction of Relocation Information for Stripped Binaries" is to appear in the International Symposium on Research in Attacks, Intrusions and Defenses (RAID). |
11/30/99 |
Our paper "Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard" is to appear in the USENIX Security Symposium. |
11/30/99 |
Our paper "ret2dir: Rethinking Kernel Isolation" is to appear in the USENIX Security Symposium. |
11/30/99 |
Our paper "Time Randomization to Thwart Concurrency Bug Exploitation" is to appear in the IEEE S&P Poster Reception. |
11/30/99 |
Our paper "Out Of Control: Overcoming Control-Flow Integrity" is to appear in the IEEE Symposium on Security and Privacy. |
11/30/99 |
Our paper " The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones" is to appear in the European Workshop on System Security (EUROSEC). |
11/30/99 |
Our paper "The Other Side of the Fence: How to Protect Against Code Injection Attacks" is to appear in the PenTest Magazine. |
11/30/99 |
Our paper "Effective Dynamic Detection of Alias Analysis Errors" is to appear in the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE). |
11/30/99 |
Our paper "SPECTRE: A Dependable Introspection Framework via System Management Mode" is to appear in the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). |
11/30/99 |
Our paper "When Firmware Modifications Attack: A Case Study of Embedded Exploitation" is to appear in the Proceedings of NDSS. |
11/30/99 |
Our paper "kGuard: Lightweight Kernel Protection" is to appear in the USENIX ;login: Magazine. |