BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 1081 | 2008 |
Renovo: A hidden code extractor for packed executables MG Kang, P Poosankam, H Yin Proceedings of the 2007 ACM workshop on Recurring malcode, 46-53, 2007 | 456 | 2007 |
Dta++: dynamic taint analysis with targeted control-flow propagation. MG Kang, S McCamant, P Poosankam, D Song NDSS, 2011 | 418 | 2011 |
Automatic patch-based exploit generation is possible: Techniques and implications D Brumley, P Poosankam, D Song, J Zheng 2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008 | 410 | 2008 |
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering J Caballero, P Poosankam, C Kreibich, D Song Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 366 | 2009 |
Loop-extended symbolic execution on binary programs P Saxena, P Poosankam, S McCamant, D Song Proceedings of the eighteenth international symposium on Software testing …, 2009 | 248 | 2009 |
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. P Saxena, S Hanna, P Poosankam, D Song NDss, 2010 | 207 | 2010 |
{MACE}:{Model-inference-Assisted} concolic exploration for protocol and vulnerability discovery CY Cho, D Babić, P Poosankam, KZ Chen, EXJ Wu, D Song 20th USENIX Security Symposium (USENIX Security 11), 2011 | 175 | 2011 |
BitScope: Automatically dissecting malicious binaries D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ... Technical Report CS-07-133, School of Computer Science, Carnegie Mellon …, 2007 | 119 | 2007 |
Path-exploration lifting: Hi-fi tests for lo-fi emulators L Martignoni, S McCamant, P Poosankam, D Song, P Maniatis ACM SIGARCH Computer Architecture News 40 (1), 337-348, 2012 | 115 | 2012 |
Differential slicing: Identifying causal execution differences for security applications NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ... 2011 IEEE Symposium on Security and Privacy, 347-362, 2011 | 109 | 2011 |
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. S Hanna, R Rolles, A Molina-Markham, P Poosankam, J Blocki, K Fu, ... HealthSec, 2011 | 98 | 2011 |
Input generation via decomposition and re-stitching: Finding bugs in malware J Caballero, P Poosankam, S McCamant, D Babi ć, D Song Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 90 | 2010 |
FiG: Automatic fingerprint generation J Caballero, S Venkataraman, P Poosankam, MG Kang, D Song, A Blum Carnegie Mellon University, 2007 | 85 | 2007 |
Cloud terminal: Secure access to sensitive applications from untrusted systems L Martignoni, P Poosankam, M Zaharia, J Han, S McCamant, D Song, ... 2012 USENIX Annual Technical Conference (USENIX ATC 12), 165-182, 2012 | 50 | 2012 |
Hookscout: Proactive binary-centric hook detection H Yin, P Poosankam, S Hanna, D Song International Conference on Detection of Intrusions and Malware, and …, 2010 | 50 | 2010 |
Design space and analysis of worm defense strategies D Brumley, LH Liu, P Poosankam, D Song Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 49 | 2006 |
Crash analysis with BitBlaze C Miller, J Caballero, NM Johnson, MG Kang, S McCamant, ... at BlackHat USA, 2010 | 43 | 2010 |
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration J Caballero, Z Liang, P Poosankam, D Song Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 35 | 2009 |
BitBlaze: Binary analysis for computer security D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... | 11 | 2013 |