Author of the publication

ProXray: Protocol Model Learning and Guided Firmware Analysis.

, , , , and . IEEE Trans. Software Eng., 47 (9): 1907-1928 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fowze, Farhaan
add a person with the name Fowze, Farhaan
 

Other publications of authors with the same name

ProXray: Protocol Model Learning and Guided Firmware Analysis., , , , and . IEEE Trans. Software Eng., 47 (9): 1907-1928 (2021)EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution., , and . AsianHOST, page 1-6. IEEE, (2022)EXERT: EXhaustive IntEgRiTy Analysis for Information Flow Security., , and . AsianHOST, page 1-6. IEEE, (2022)SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations., and . MEMOCODE, page 126-133. ACM, (2021)Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis., and . NSysS, page 29-39. ACM, (2021)FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution., , , , and . CCS, page 2245-2262. ACM, (2017)Specification, verification, and synthesis using extended state machines with callbacks., and . MEMOCODE, page 95-104. IEEE, (2016)ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1577-1595 (March 2023)Toward Automated Firmware Analysis in the IoT Era., , , , , and . IEEE Secur. Priv., 17 (5): 38-46 (2019)Extracting configuration parameter interactions using static analysis., , , and . ICPC, page 1-4. IEEE Computer Society, (2016)