SOK:(State of) The Art of War: Offensive Techniques in Binary Analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... Security and Privacy (S&P), 2016 IEEE Symposium on, 138-157, 2016 | 1403 | 2016 |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ... Proceedings of the Network and Distributed System Security Symposium, 2016 | 1244 | 2016 |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna Proceedings of the Network and Distributed System Security Symposium, 2015 | 528 | 2015 |
Ramblr: Making Reassembly Great Again R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ... Proceedings of the Network and Distributed System Security Symposium, 2017 | 194 | 2017 |
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ... Proceedings of the Network and Distributed System Security Symposium, 2017 | 150 | 2017 |
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... 2020 IEEE Symposium on Security and Privacy (SP), 431-448, 2020 | 130 | 2020 |
Angr-the next generation of binary analysis F Wang, Y Shoshitaishvili 2017 IEEE Cybersecurity Development (SecDev), 8-9, 2017 | 117 | 2017 |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... IEEE Symposium on Security and Privacy, 2021 | 112 | 2021 |
{REPT}: Reverse debugging of failures in deployed software W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018 | 112 | 2018 |
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems GJA Efrén López-Morales, Carlos Rubio-Medrano, Adam Doupé, Yan ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 96 | 2020 |
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits T Bao, R Wang, Y Shoshitaishvili, D Brumley Security and Privacy (SP), 2017 IEEE Symposium on, 824-839, 2017 | 81 | 2017 |
{HeapHopper}: Bringing bounded model checking to heap implementation security M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna 27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018 | 80 | 2018 |
The wmdp benchmark: Measuring and reducing malicious use with unlearning N Li, A Pan, A Gopal, S Yue, D Berrios, A Gatti, JD Li, AK Dombrowski, ... arXiv preprint arXiv:2403.03218, 2024 | 78 | 2024 |
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ... | 77 | 2017 |
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services R Wang, Y Shoshitaishvili, C Kruegel, G Vigna Proceedings of the 22nd USENIX conference on Security, 687-702, 2013 | 72 | 2013 |
De-obfuscation and Detection of Malicious PDF Files with High Accuracy X Lu, J Zhuge, R Wang, Y Cao, Y Chen System Sciences (HICSS), 2013 46th Hawaii International Conference on, 4890-4899, 2013 | 68 | 2013 |
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ... NDSS, 2021 | 60 | 2021 |
Scam pandemic: How attackers exploit public fear through phishing M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ... 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020 | 54 | 2020 |
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 52 | 2019 |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities E Trickel, F Pagani, C Zhu, L Dresel, G Vigna, C Kruegel, R Wang, T Bao, ... 2023 IEEE Symposium on Security and Privacy (SP), 116-133, 2023 | 40 | 2023 |