Sok: Enabling security analyses of embedded systems via rehosting A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ... Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021 | 70 | 2021 |
{AVLeak}: fingerprinting antivirus emulators through {Black-Box} testing J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 58 | 2016 |
Evaluating synthetic bugs J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 25 | 2021 |
{AutoCTF}: Creating diverse pwnables via automated bug injection P Hulin, A Davis, R Sridhar, A Fasano, C Gallagher, A Sedlacek, T Leek, ... 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 22 | 2017 |
PyPANDA: taming the pandamonium of whole system dynamic analysis L Craig, A Fasano, T Ballo, T Leek, B Dolan-Gavitt, W Robertson NDSS Binary Analysis Research Workshop, 2021 | 12 | 2021 |
The rode0day to less-buggy programs A Fasano, T Leek, B Dolan-Gavitt, J Bundt IEEE Security & Privacy 17 (6), 84-88, 2019 | 12 | 2019 |
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek 2023 IEEE Conference on Software Testing, Verification and Validation (ICST …, 2023 | 3 | 2023 |
Entropy poisoning from the hypervisor M Alt, W Barto, A Fasano, A King Unpublished class project, 2015 | 3 | 2015 |