Publications
-
Andrew Reynolds,
Maverick Woo,
Clark Barrett,
David Brumley,
Tianyi Liang, and
Cesare Tinelli,
"Scaling Up
DPLL(T) String Solvers using Context-Dependent Simplification",
in Proceedings of the 29th International Conference on Computer
Aided Verification, 2017, pp. 453-474.
(preprint)
-
Dominic D. Chen,
Manuel Egele,
Maverick Woo, and
David Brumley,
"Towards
Automated Dynamic Analysis for Linux-based Embedded Firmware",
in Proceedings of the Network and Distributed System Security
Symposium, 2016.
(open access)
-
Ilker Nadi Bozkurt,
Hai Huang,
Bruce Maggs,
Andrea Richa, and
Maverick Woo,
"Mutual
Embeddings",
in Journal of Interconnection Networks 15.01n02, 2015.
(preprint)
-
Sang Kil Cha,
Maverick Woo, and
David Brumley,
"Program-Adaptive
Mutational Fuzzing,"
in Proceedings of the 36th IEEE Symposium on Security and
Privacy, 2015, pp. 725-741.
(preprint)
-
Tiffany Bao,
Jonathan Burket,
Maverick Woo,
Rafael Turner, and
David Brumley,
"ByteWeight:
Learning to Recognize Functions in Binary Code",
in Proceedings of the 23rd USENIX Security Symposium, 2014,
pp. 845-860.
(open access)
-
Manuel Egele,
Maverick Woo,
Peter Chapman, and
David Brumley,
"Blanket
Execution: Dynamic Similarity Testing for Program Binaries and
Components",
in Proceedings of the 23rd USENIX Security Symposium, 2014,
pp. 303-317.
(open access)
-
Thanassis Avgerinos,
Sang Kil Cha,
Alex Rebert,
Edward J. Schwartz,
Maverick Woo, and
David Brumley,
"Automatic Exploit
Generation",
in Communications of the ACM, vol. 57, no. 2, 2014,
pp. 74-84.
(ACM Author-Izer)
-
Maverick Woo,
Sang Kil Cha,
Samantha Gottlieb, and
David Brumley,
"Scheduling
Black-box Mutational Fuzzing",
in Proceedings of the 20th ACM Conference on Computer and
Communications Security, 2013, pp. 511-522.
(ACM Author-Izer,
slides)
-
Edward J. Schwartz,
JongHyup Lee,
Maverick Woo, and
David Brumley,
"Native
x86 Decompilation using Semantics-Preserving Structural Analysis and
Iterative Control-Flow Structuring",
in Proceedings of the 22nd USENIX Security Symposium, 2013,
pp. 353-368.
(open access)
-
Jiyong Jang,
Maverick Woo, and
David Brumley,
"Towards
Automatic Software Lineage Inference",
in Proceedings of the 22nd USENIX Security Symposium, 2013,
pp. 81-96.
(open access)
-
Jiyong Jang,
Maverick Woo, and
David Brumley,
"ReDeBug:
Finding Unpatched Code Clones in Entire OS Distributions",
in USENIX ;login:, vol. 37, no. 6, 2012, pp. 58-67.
(preprint)
-
Jonathan Derryberry,
Don Sheehy,
Daniel D. Sleator, and
Maverick Woo,
"Achieving
Spatial Adaptivity while Finding Approximate Nearest Neighbors",
in Proceedings of the 20th Annual Canadian Conference on
Computational Geometry, 2008.
(open access)
-
Virginia Vassilevska,
Ryan Williams, and
Shan Leung Maverick Woo,
"Confronting
Hardness Using a Hybrid Approach",
in Proceedings of the 17th ACM-SIAM Symposium on Discrete
Algorithm, 2006, pp. 1-10.
-
Bruce M. Maggs,
Gary L. Miller,
Ojas Parekh,
R. Ravi, and
Shan Leung Maverick Woo,
"Finding Effective
Support-Tree Preconditioners",
in Proceedings of the 17th ACM Symposium on Parallelism in
Algorithms and Architectures, 2005, pp. 176-185.
(ACM Author-Izer)
-
Umut A. Acar,
Guy E. Blelloch,
Robert Harper,
Jorge L. Vittes, and
Shan Leung Maverick Woo,
"Dynamizing
Static Algorithms, with Applications to Dynamic Trees and History
Independence",
in Proceedings of the 15th ACM-SIAM Symposium on Discrete
Algorithm, 2004, pp. 531-540.
-
Guy E. Blelloch,
Bruce M. Maggs, and
Shan Leung Maverick Woo,
"Space-Efficient
Finger Search on Degree-Balanced Search Trees",
in Proceedings of the 14th ACM-SIAM Symposium on Discrete
Algorithms, 2003, pp. 374-383.
|