AVLeak: fingerprinting antivirus emulators through black-box testing J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener Proceedings of the 10th USENIX Conference on Offensive Technologies, 91-105, 2016 | 47 | 2016 |
Sok: Enabling security analyses of embedded systems via rehosting A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ... Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021 | 17 | 2021 |
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. P Hulin, A Davis, R Sridhar, A Fasano, C Gallagher, A Sedlacek, T Leek, ... WOOT, 2017 | 17 | 2017 |
Evaluating synthetic bugs J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 13 | 2021 |
The rode0day to less-buggy programs A Fasano, T Leek, B Dolan-Gavitt, J Bundt IEEE Security & Privacy 17 (6), 84-88, 2019 | 8 | 2019 |
PyPANDA: taming the pandamonium of whole system dynamic analysis L Craig, A Fasano, T Ballo, T Leek, B Dolan-Gavitt, W Robertson NDSS Binary Analysis Research Workshop, 2021 | 4 | 2021 |
Entropy poisoning from the hypervisor M Alt, W Barto, A Fasano, A King Unpublished class project, 2015 | 3 | 2015 |
Rode0day: A Year of Bug-Finding Evaluations A Fasano | 1 | 2019 |
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek arXiv preprint arXiv:2212.11162, 2022 | | 2022 |
{AVLeak}: Fingerprinting Antivirus Emulators through {Black-Box} Testing J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | | 2016 |
Open Access Media A Fasano | | |