Seguir
Christopher Salls
Christopher Salls
Dirección de correo verificada de cs.ucsb.edu - Página principal
Título
Citado por
Citado por
Año
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
13412016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
12132016
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2222017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1482017
Neurlux: dynamic malware analysis without feature engineering
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
782019
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
742017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
302018
Token-Level Fuzzing
C Salls, C Jindal, J Corina, C Kruegel, G Vigna
30th USENIX Security Symposium (USENIX Security 21), 2795–2809, 2021
192021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
112020
Piston: Uncooperative remote runtime patching
C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox!
C Salls
62017
Neurlux
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
12019
Fuzzing and Symbolic Execution to Identify and Patch Bugs
CA Salls
University of California, Santa Barbara, 2020
2020
DIFUZE
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–16