Prati
Tiffany Bao
Tiffany Bao
Potvrđena adresa e-pošte na asu.edu
Naslov
Citirano
Citirano
Godina
ByteWeight: Learning to Recognize Functions in Binary Code
T Bao, J Burket, M Woo, R Turner, D Brumley
USENIX Security, 845-860, 2014
3562014
Matched and mismatched SOCs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1552019
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
The Network and Distributed System Security Symposium, 2020
1462020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
IEEE Symposium on Security and Privacy, 2021
1182021
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
982020
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
T Bao, R Wang, Y Shoshitaishvili, D Brumley
38th IEEE Symposium on Security and Privacy, 2017
812017
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
NDSS, 2021
602021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
Symposium on Electronic Crime Research, 2020
572020
Expected exploitability: Predicting the development of functional vulnerability exploits
O Suciu, C Nelson, Z Lyu, T Bao, T Dumitraș
31st USENIX Security Symposium (USENIX Security 22), 377-394, 2022
522022
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities
E Trickel, F Pagani, C Zhu, L Dresel, G Vigna, C Kruegel, R Wang, T Bao, ...
2023 IEEE symposium on security and privacy (SP), 2658-2675, 2023
412023
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao
31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022
322022
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs
J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ...
31st USENIX Security Symposium (USENIX Security 22), 413-430, 2022
282022
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
14th USENIX Workshop on Offensive Technologies, 2020
262020
SoK: Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
J Pakki, Y Shoshitaishvili, R Wang, T Bao, A Doupé
Financial Cryptography and Data Security, 2021
25*2021
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the ninth ACM conference on data and application security and …, 2019
242019
Beyond phish: Toward detecting fraudulent e-commerce websites at scale
M Bitaab, H Cho, A Oest, Z Lyu, W Wang, J Abraham, R Wang, T Bao, ...
2023 ieee symposium on security and privacy (sp), 2566-2583, 2023
212023
How Shall We Play a Game: A Game-Theoretical Model for Cyber-warfare Games
T Bao, Y Shoshitaishvili, R Wang, C Kruegel, G Vigna, D Brumley
30th IEEE Computer Security Foundations Symposium, 2017
212017
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
202021
I'm spartacus, no, i'm spartacus: Proactively protecting users from phishing by intentionally triggering cloaking behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
192022
ViK: practical mitigation of temporal memory safety violations through object ID inspection
H Cho, J Park, A Oest, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
Proceedings of the 27th ACM International Conference on Architectural …, 2022
172022
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20