Follow
Brendan D. Saltaformaggio
Brendan D. Saltaformaggio
Associate Professor, Georgia Institute of Technology
Verified email at ece.gatech.edu - Homepage
Title
Cited by
Cited by
Year
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1772016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
B Saltaformaggio, H Choi, K Johnson, Y Kwon, Q Zhang, X Zhang, D Xu, ...
USENIX Workshop on Offensive Technologies, 2016
1232016
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
R Duan, O Alrawi, RP Kasturi, R Elder, B Saltaformaggio, W Lee
Annual Network and Distributed System Security Symposium (NDSS), 2021
1002021
LDX: Causality Inference by Lightweight Dual Execution
Y Kwon, D Kim, WN Sumner, K Kim, B Saltaformaggio, X Zhang, D Xu
Proceedings of the Twenty-First International Conference on Architectural …, 2016
712016
iRiS: Vetting Private API Abuse in iOS Applications
Z Deng, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
712015
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike, B Saltaformaggio, W Lee
Proceedings of 26th Network and Distributed System Security Symposium (NDSS'19), 2019
602019
GUITAR: Piecing together android app GUIs from memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
572015
Busmonitor: A hypervisor-based solution for memory bus covert channels
B Saltaformaggio, D Xu, X Zhang
Proceedings of 6th European Workshop on Systems Security (EuroSec'13, in …, 2013
472013
RevARM: A platform-agnostic ARM binary rewriter for security applications
T Kim, CH Kim, H Choi, Y Kwon, B Saltaformaggio, X Zhang, D Xu
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
462017
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
AI Ali-Gombe, B Saltaformaggio, D Xu, GG Richard III
Computers & Security 73, 235-248, 2018
432018
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Face-Change: Application-driven dynamic kernel view switching in a virtual machine
Z Gu, B Saltaformaggio, X Zhang, D Xu
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
402014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
B Saltaformaggio, Z Gu, X Zhang, D Xu
Proceedings of the 23rd USENIX Conference on Security Symposium, 255-269, 2014
392014
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images
B Saltaformaggio, R Bhatia, X Zhang, D Xu, GG Richard III
Proceedings of the 25th USENIX conference on Security Symposium, 2016
312016
The Betrayal at Cloud City: An Empirical Analysis of Cloud-Based Mobile Backends
O Alrawi, C Zuo, R Duan, RP Kasturi, Z Lin, B Saltaformaggio
Proceedings of 28th USENIX Security Symposium (Security '19), 551-566, 2019
302019
Live acquisition of main memory data from Android smartphones and smartwatches
SJ Yang, JH Choi, KB Kim, R Bhatia, B Saltaformaggio, D Xu
Digital Investigation 23, 50-62, 2017
302017
{ARCUS}: symbolic root cause analysis of exploits in production systems
C Yagemann, M Pruett, SP Chung, K Bittick, B Saltaformaggio, W Lee
30th USENIX Security Symposium (USENIX Security 21), 1989-2006, 2021
272021
Forecasting malware capabilities from cyber attack memory images
O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua, T Hirani, B Hill, ...
30th USENIX security symposium (USENIX security 21), 3523-3540, 2021
242021
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation
H Lu, B Saltaformaggio, R Kompella, D Xu
Proceedings of the Sixth ACM Symposium on Cloud Computing, 125-138, 2015
222015
A2C: Self Destructing Exploit Executions via Input Perturbation
Y Kwon, B Saltaformaggio, IL Kim, KH Lee, X Zhang, D Xu
Proceedings of the 24th Network and Distributed System Security Symposium, 2017
212017
The system can't perform the operation now. Try again later.
Articles 1–20