Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Maverick Woo (Shan Leung)

Hello, I am a Systems Scientist at CyLab in Carnegie Mellon University. I received my Ph.D. in Computer Science from Carnegie Mellon in 2009 and joined CyLab in 2011. My current research interests include software security and program analysis, with a focus on algorithm design and budget optimization.

Contact

pooh at cmu dot edu

4720 Forbes Ave., Room 2120
Carnegie Mellon University
Pittsburgh, PA 15213

Research Opportunities

My collaborators and I are looking for postdocs and PhD students in the area of program transformation, including decompilation, type reconstruction, and software security mechanisms. Please email me if you are interested to hear more. In your email, please make sure you write the word "Winnie" somewhere easy to spot. Thank you!

Also, please know that CyLab is hiring postdocs and Systems Scientist in the areas related to Cyber Autonomy.

Publications

  1. Andrew Reynolds, Maverick Woo, Clark Barrett, David Brumley, Tianyi Liang, and Cesare Tinelli, "Scaling Up DPLL(T) String Solvers using Context-Dependent Simplification", in Proceedings of the 29th International Conference on Computer Aided Verification, 2017, pp. 453-474. (preprint)
  2. Dominic D. Chen, Manuel Egele, Maverick Woo, and David Brumley, "Towards Automated Dynamic Analysis for Linux-based Embedded Firmware", in Proceedings of the Network and Distributed System Security Symposium, 2016. (open access)
  3. Ilker Nadi Bozkurt, Hai Huang, Bruce Maggs, Andrea Richa, and Maverick Woo, "Mutual Embeddings", in Journal of Interconnection Networks 15.01n02, 2015. (preprint)
  4. Sang Kil Cha, Maverick Woo, and David Brumley, "Program-Adaptive Mutational Fuzzing," in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015, pp. 725-741. (preprint)
  5. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley, "ByteWeight: Learning to Recognize Functions in Binary Code", in Proceedings of the 23rd USENIX Security Symposium, 2014, pp. 845-860. (open access)
  6. Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley, "Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components", in Proceedings of the 23rd USENIX Security Symposium, 2014, pp. 303-317. (open access)
  7. Thanassis Avgerinos, Sang Kil Cha, Alex Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley, "Automatic Exploit Generation", in Communications of the ACM, vol. 57, no. 2, 2014, pp. 74-84. (ACM Author-Izer)
  8. Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley, "Scheduling Black-box Mutational Fuzzing", in Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013, pp. 511-522. (ACM Author-Izer, slides)
  9. Edward J. Schwartz, JongHyup Lee, Maverick Woo, and David Brumley, "Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring", in Proceedings of the 22nd USENIX Security Symposium, 2013, pp. 353-368. (open access)
  10. Jiyong Jang, Maverick Woo, and David Brumley, "Towards Automatic Software Lineage Inference", in Proceedings of the 22nd USENIX Security Symposium, 2013, pp. 81-96. (open access)
  11. Jiyong Jang, Maverick Woo, and David Brumley, "ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions", in USENIX ;login:, vol. 37, no. 6, 2012, pp. 58-67. (preprint)
  12. Jonathan Derryberry, Don Sheehy, Daniel D. Sleator, and Maverick Woo, "Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors", in Proceedings of the 20th Annual Canadian Conference on Computational Geometry, 2008. (open access)
  13. Virginia Vassilevska, Ryan Williams, and Shan Leung Maverick Woo, "Confronting Hardness Using a Hybrid Approach", in Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithm, 2006, pp. 1-10.
  14. Bruce M. Maggs, Gary L. Miller, Ojas Parekh, R. Ravi, and Shan Leung Maverick Woo, "Finding Effective Support-Tree Preconditioners", in Proceedings of the 17th ACM Symposium on Parallelism in Algorithms and Architectures, 2005, pp. 176-185. (ACM Author-Izer)
  15. Umut A. Acar, Guy E. Blelloch, Robert Harper, Jorge L. Vittes, and Shan Leung Maverick Woo, "Dynamizing Static Algorithms, with Applications to Dynamic Trees and History Independence", in Proceedings of the 15th ACM-SIAM Symposium on Discrete Algorithm, 2004, pp. 531-540.
  16. Guy E. Blelloch, Bruce M. Maggs, and Shan Leung Maverick Woo, "Space-Efficient Finger Search on Degree-Balanced Search Trees", in Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms, 2003, pp. 374-383.

Program Committee

  1. 2nd IEEE Conference on Dependable and Secure Computing, 2018.
  2. 13th ACM ASIA Conference on Information, Computer and Communications Security, 2018.
  3. 33rd Annual Computer Security Applications Conference, 2017.
  4. 1st IEEE Conference on Dependable and Secure Computing, 2017.
  5. 32nd Annual Computer Security Applications Conference, 2016.
  6. 31st Annual Computer Security Applications Conference, 2015.
Last Updated: 2018-01-30.