Follow
Andrew Fasano
Andrew Fasano
MIT & Northeastern University
Verified email at mit.edu
Title
Cited by
Cited by
Year
Sok: Enabling security analyses of embedded systems via rehosting
A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
702021
{AVLeak}: fingerprinting antivirus emulators through {Black-Box} testing
J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
582016
Evaluating synthetic bugs
J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
252021
{AutoCTF}: Creating diverse pwnables via automated bug injection
P Hulin, A Davis, R Sridhar, A Fasano, C Gallagher, A Sedlacek, T Leek, ...
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
222017
PyPANDA: taming the pandamonium of whole system dynamic analysis
L Craig, A Fasano, T Ballo, T Leek, B Dolan-Gavitt, W Robertson
NDSS Binary Analysis Research Workshop, 2021
122021
The rode0day to less-buggy programs
A Fasano, T Leek, B Dolan-Gavitt, J Bundt
IEEE Security & Privacy 17 (6), 84-88, 2019
122019
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis
J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek
2023 IEEE Conference on Software Testing, Verification and Validation (ICST …, 2023
32023
Entropy poisoning from the hypervisor
M Alt, W Barto, A Fasano, A King
Unpublished class project, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–8