Follow
Evan Downing
Evan Downing
Unknown affiliation
No verified email - Homepage
Title
Cited by
Cited by
Year
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1172017
Enabling refinable {Cross-Host} attack investigation with efficient data flow tagging and tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th USENIX Security Symposium (USENIX Security 18), 1705-1722, 2018
582018
Nv: Nessus vulnerability visualization for the web
L Harrison, R Spahn, M Iannacone, E Downing, JR Goodall
Proceedings of the ninth international symposium on visualization for cyber …, 2012
422012
{DeepReflect}: Discovering malicious functionality through binary reconstruction
E Downing, Y Mirsky, K Park, W Lee
30th USENIX Security Symposium (USENIX Security 21), 3469-3486, 2021
232021
situ: Situational understanding and discovery for cyber attacks
L Harrison, J Laska, R Spahn, M Iannacone, E Downing, EM Ferragut, ...
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 307-308, 2012
122012
{VulChecker}: Graph-based Vulnerability Localization in Source Code
Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ...
32nd USENIX Security Symposium (USENIX Security 23), 6557-6574, 2023
102023
Identifying behavior dispatchers for malware analysis
K Park, B Sahin, Y Chen, J Zhao, E Downing, H Hu, W Lee
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
72021
MLsploit: a framework for interactive experimentation with adversarial machine learning research
N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ...
Proc. of the 25th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2019
52019
Beholder: Phase-Space Detection of Cyber Events
JMH Jiménez, L Hively, E Downing, A Ferber, S Prowell, R Wagner
Oak Ridge National Laboratory, Oak Ridge, TN, ORNL/TM-2013/294, 2013
42013
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis.
L Chen, C Yagemann, E Downing
CVPR Workshops, 48-52, 2019
32019
RAIN
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–11