Dynodroid: An input generation system for android apps A Machiry, R Tahiliani, M Naik Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 953 | 2013 |
Difuze: Interface aware fuzzing for kernel drivers J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 238 | 2017 |
Ramblr: Making Reassembly Great Again. R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ... NDSS, 2017 | 197 | 2017 |
Toward the analysis of embedded firmware through automated re-hosting E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 169 | 2019 |
{DR}.{CHECKER}: A soundy analysis for linux kernel drivers A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna 26th USENIX Security Symposium (USENIX Security 17), 1007-1024, 2017 | 160 | 2017 |
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ... NDSS, 2017 | 151 | 2017 |
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... 2020 IEEE Symposium on Security and Privacy (SP), 431-448, 2020 | 134 | 2020 |
Detecting deceptive reviews using generative adversarial networks H Aghakhani, A Machiry, S Nilizadeh, C Kruegel, G Vigna 2018 IEEE security and privacy workshops (SPW), 89-95, 2018 | 102 | 2018 |
{BootStomp}: On the security of bootloaders in mobile devices N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ... 26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017 | 86 | 2017 |
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ... 2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021 | 75 | 2021 |
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 53 | 2019 |
SPIDER: Enabling Fast Patch Propagation in Related Software Repositories A Machiry, N Redini, E Camellini, C Kruegel, G Vigna 2020 IEEE Symposium on Security and Privacy (SP), 512-529, 2020 | 51 | 2020 |
Broken Fingers: On the Usage of the Fingerprint API in Android. A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ... NDSS, 2018 | 49 | 2018 |
Clapp: Characterizing loops in android applications Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 45 | 2015 |
Characterizing the security of github {CI} workflows I Koishybayev, A Nahapetyan, R Zachariah, S Muralee, B Reaves, ... 31st USENIX Security Symposium (USENIX Security 22), 2747-2763, 2022 | 40 | 2022 |
Mechanical phish: Resilient autonomous hacking Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ... IEEE Security & Privacy 16 (2), 12-22, 2018 | 31 | 2018 |
Conware: Automated modeling of hardware peripherals C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ... Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021 | 29 | 2021 |
Arbitrar: User-guided api misuse detection Z Li, A Machiry, B Chen, M Naik, K Wang, L Song 2021 IEEE Symposium on Security and Privacy (SP), 1400-1415, 2021 | 29 | 2021 |
Teezz: Fuzzing trusted applications on cots android devices M Busch, A Machiry, C Spensky, G Vigna, C Kruegel, M Payer 2023 IEEE Symposium on Security and Privacy (SP), 1204-1219, 2023 | 27 | 2023 |
Using loops for malware classification resilient to feature-unaware perturbations A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ... Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 26 | 2018 |