Suivre
Audrey Dutcher
Audrey Dutcher
Student, Arizona State University
Adresse e-mail validée de rhelmot.io - Page d'accueil
Titre
Citée par
Citée par
Année
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
14372016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
12692016
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
322018
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
HJ Tay, K Zeng, JM Vadayath, AS Raj, A Dutcher, T Reddy, W Gibbs, ...
32nd USENIX Security Symposium (USENIX Security 23), 5791-5808, 2023
162023
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning
KK Pal, AP Bajaj, P Banerjee, A Dutcher, M Nakamura, ZL Basque, ...
2024 IEEE Symposium on Security and Privacy (SP), 152-152, 2024
102024
angr: A Powerful and User-friendly Binary Analysis Platform
Y Shoshitaishvili, R Wang, A Dutcher, C Kruegel, G Vigna
en. In, 2017
12017
Operation Mango: Scalable Discovery of {Taint-Style} Vulnerabilities in Binary Firmware Services
W Gibbs, AS Raj, JM Vadayath, HJ Tay, J Miller, A Ajayan, ZL Basque, ...
33rd USENIX Security Symposium (USENIX Security 24), 7123-7139, 2024
2024
Identifying Program Entropy Characteristics with Symbolic Execution
AA Dutcher
University of California, Santa Barbara, 2019
2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–8