default search action
Stephen McCamant
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Kartik Ramkrishnan, Stephen McCamant, Antonia Zhai, Pen-Chung Yew:
Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses. AsiaCCS 2024 - [i5]Soha Hussein, Stephen McCamant, Mike Whalen:
Generator-Based Fuzzers with Type-Based Targeted Mutation. CoRR abs/2406.02034 (2024) - 2023
- [c43]Soha Hussein, Stephen McCamant, Elena Sherman, Vaibhav Sharma, Mike Whalen:
Structural Test Input Generation for 3-Address Code Coverage Using Path-Merged Symbolic Execution. AST 2023: 79-89 - [c42]Soha Hussein, Qiuchen Yan, Stephen McCamant, Vaibhav Sharma, Michael W. Whalen:
Java Ranger: Supporting String and Array Operations in Java Ranger (Competition Contribution). TACAS (2) 2023: 553-558 - 2022
- [c41]Soha Hussein, Sanjai Rayadurgam, Stephen McCamant, Vaibhav Sharma, Mats P. E. Heimdahl:
Counterexample-Guided Inductive Repair of Reactive Contracts. FormaliSE@ICSE 2022: 46-57 - [c40]Minjun Wu, Stephen McCamant, Pen-Chung Yew, Antonia Zhai:
PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring. SEED 2022: 25-36 - 2021
- [j4]Vaibhav Sharma, Kesha Hietala, Stephen McCamant:
Finding Substitutable Binary Code By Synthesizing Adapters. IEEE Trans. Software Eng. 47(8): 1626-1643 (2021) - [c39]Soha Hussein, Vaibhav Sharma, Stephen McCamant, Sanjai Rayadurgam, Mats Per Erik Heimdahl:
Counterexample Guided Inductive Repair of Reactive Contracts. ASE 2021: 1190-1192 - [c38]Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant:
Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning. NDSS 2021 - [c37]Qiushi Wu, Aditya Pakki, Navid Emamdoost, Stephen McCamant, Kangjie Lu:
Understanding and Detecting Disordered Error Handling with Precise Function Pairing. USENIX Security Symposium 2021: 2041-2058 - 2020
- [c36]Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant:
Efficient and scalable cross-ISA virtualization of hardware transactional memory. CGO 2020: 107-120 - [c35]Kartik Ramkrishnan, Stephen McCamant, Pen-Chung Yew, Antonia Zhai:
First Time Miss : Low Overhead Mitigation for Shared Memory Cache Side Channels. ICPP 2020: 36:1-36:11 - [c34]Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu:
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison. NDSS 2020 - [c33]Vaibhav Sharma, Soha Hussein, Michael W. Whalen, Stephen McCamant, Willem Visser:
Java Ranger: statically summarizing regions for efficient symbolic execution of Java. ESEC/SIGSOFT FSE 2020: 123-134 - [c32]Seonmo Kim, Stephen McCamant:
Structural Bit-vector Model Counting. SMT 2020: 26-36 - [c31]Vaibhav Sharma, Soha Hussein, Michael W. Whalen, Stephen McCamant, Willem Visser:
Java Ranger at SV-COMP 2020 (Competition Contribution). TACAS (2) 2020: 393-397
2010 – 2019
- 2019
- [c30]Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan:
Program-mandering: Quantitative Privilege Separation. CCS 2019: 1023-1040 - [i4]Kartik Ramkrishnan, Antonia Zhai, Stephen McCamant, Pen-Chung Yew:
New Attacks and Defenses for Randomized Caches. CoRR abs/1909.12302 (2019) - 2018
- [c29]Wenwen Wang, Stephen McCamant, Antonia Zhai, Pen-Chung Yew:
Enhancing Cross-ISA DBT Through Automatically Learned Translation Rules. ASPLOS 2018: 84-97 - [c28]Vaibhav Sharma, Kesha Hietala, Stephen McCamant:
Finding Substitutable Binary Code for Reverse Engineering by Synthesizing Adapters. ICST 2018: 150-160 - [c27]Vaibhav Sharma, Taejoon Byun, Stephen McCamant, Sanjai Rayadurgam, Mats Per Erik Heimdahl:
Contract discovery from black-box components. WASPI@ESEC/SIGSOFT FSE 2018: 5-8 - [c26]Seonmo Kim, Stephen McCamant:
Bit-Vector Model Counting Using Statistical Estimation. TACAS (1) 2018: 133-151 - [c25]Qiuchen Yan, Stephen McCamant:
Fast PokeEMU: Scaling Generated Instruction Tests Using Aggregation and State Chaining. VEE 2018: 71-83 - [i3]Navid Emamdoost, Stephen McCamant:
The Effect of Instruction Padding on SFI Overhead. CoRR abs/1803.00169 (2018) - 2017
- [j3]Vaibhav Sharma, Michael W. Whalen, Stephen McCamant, Willem Visser:
Veritesting Challenges in Symbolic Execution of Java. ACM SIGSOFT Softw. Eng. Notes 42(4): 1-5 (2017) - [j2]Andrew Henderson, Lok-Kwong Yan, Xunchao Hu, Aravind Prakash, Heng Yin, Stephen McCamant:
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform. IEEE Trans. Software Eng. 43(2): 164-184 (2017) - [c24]Taejoon Byun, Vaibhav Sharma, Sanjai Rayadurgam, Stephen McCamant, Mats Per Erik Heimdahl:
Toward Rigorous Object-Code Coverage Criteria. ISSRE 2017: 328-338 - [c23]Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant, Youfeng Wu, Jayaram Bobba:
Enabling Cross-ISA Offloading for COTS Binaries. MobiSys 2017: 319-331 - [i2]Vaibhav Sharma, Kesha Hietala, Stephen McCamant:
Finding Semantically-Equivalent Binary Code By Synthesizing Adaptors. CoRR abs/1707.01536 (2017) - [i1]Seonmo Kim, Stephen McCamant:
Bit-Vector Model Counting using Statistical Estimation. CoRR abs/1712.07770 (2017) - 2016
- [c22]Wenwen Wang, Pen-Chung Yew, Antonia Zhai, Stephen McCamant:
A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT). USENIX ATC 2016: 591-603 - 2013
- [c21]Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres:
Protecting function pointers in binary. AsiaCCS 2013: 487-492 - [c20]Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song:
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. ESORICS 2013: 164-181 - [c19]Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou:
Practical Control Flow Integrity and Randomization for Binary Executables. IEEE Symposium on Security and Privacy 2013: 559-573 - 2012
- [c18]Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis:
Path-exploration lifting: hi-fi tests for lo-fi emulators. ASPLOS 2012: 337-348 - [c17]Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica:
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. USENIX ATC 2012: 165-182 - 2011
- [c16]Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song:
Statically-directed dynamic automated test generation. ISSTA 2011: 12-22 - [c15]Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song:
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. NDSS 2011 - [c14]Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song:
Differential Slicing: Identifying Causal Execution Differences for Security Applications. IEEE Symposium on Security and Privacy 2011: 347-362 - 2010
- [c13]Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song:
Input generation via decomposition and re-stitching: finding bugs in Malware. CCS 2010: 413-425 - [c12]Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song:
Binary Code Extraction and Interface Identification for Security Applications. NDSS 2010 - [c11]Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng Mao, Stephen McCamant, Dawn Song:
A Symbolic Execution Framework for JavaScript. IEEE Symposium on Security and Privacy 2010: 513-528
2000 – 2009
- 2009
- [c10]Min Gyung Kang, Heng Yin, Steve Hanna, Stephen McCamant, Dawn Song:
Emulating emulation-resistant malware. VMSec@CCS 2009: 11-22 - [c9]Prateek Saxena, Pongsin Poosankam, Stephen McCamant, Dawn Song:
Loop-extended symbolic execution on binary programs. ISSTA 2009: 225-236 - [c8]James Newsome, Stephen McCamant, Dawn Song:
Measuring channel capacity to distinguish undue influence. PLAS 2009: 73-85 - 2008
- [b1]Stephen McCamant:
Quantitative information-flow tracking for real systems. Massachusetts Institute of Technology, Cambridge, MA, USA, 2008 - [c7]Stephen McCamant, Michael D. Ernst:
Quantitative information flow as network flow capacity. PLDI 2008: 193-205 - 2007
- [j1]Michael D. Ernst, Jeff H. Perkins, Philip J. Guo, Stephen McCamant, Carlos Pacheco, Matthew S. Tschantz, Chen Xiao:
The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1-3): 35-45 (2007) - [c6]Stephen McCamant, Michael D. Ernst:
A simulation-based proof technique for dynamic information flow. PLAS 2007: 41-46 - 2006
- [c5]Brian Demsky, Michael D. Ernst, Philip J. Guo, Stephen McCamant, Jeff H. Perkins, Martin C. Rinard:
Inference and enforcement of data structure consistency specifications. ISSTA 2006: 233-244 - [c4]Philip J. Guo, Jeff H. Perkins, Stephen McCamant, Michael D. Ernst:
Dynamic inference of abstract types. ISSTA 2006: 255-265 - [c3]Stephen McCamant, Greg Morrisett:
Evaluating SFI for a CISC Architecture. USENIX Security Symposium 2006 - 2004
- [c2]Stephen McCamant, Michael D. Ernst:
Early Identification of Incompatibilities in Multi-component Upgrades. ECOOP 2004: 440-464 - 2003
- [c1]Stephen McCamant, Michael D. Ernst:
Predicting problems caused by component upgrades. ESEC / SIGSOFT FSE 2003: 287-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint