Author of the publication

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.

, , , , , , , , , and . SP, page 2658-2675. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance., , , , , , and . CCS, page 347-362. ACM, (2017)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2021)Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention., , , , , , , , and . USENIX Security Symposium, page 735-752. USENIX Association, (2022)Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 413-430. USENIX Association, (2022)SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 138-157. IEEE Computer Society, (2016)The WMDP Benchmark: Measuring and Reducing Malicious Use with Unlearning., , , , , , , , , and 36 other author(s). ICML, OpenReview.net, (2024)Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services., , , , , , , , , and 5 other author(s). USENIX Security Symposium, USENIX Association, (2024)