Seguir
Eric Gustafson
Eric Gustafson
E-mail confirmado em cs.ucsb.edu - Página inicial
Título
Citado por
Citado por
Ano
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
1532020
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1342019
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1322017
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
692017
Andlantis: Large-scale Android dynamic analysis
M Bierma, E Gustafson, J Erickson, D Fritz, YR Choe
arXiv preprint arXiv:1410.7751, 2014
632014
Shell We Play A Game?{CTF-as-a-service} for Security Education
E Trickel, F Disperati, E Gustafson, F Kalantari, M Mabey, N Tiwari, ...
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
612017
Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing
T Scharnowski, N Bars, M Schloegel, E Gustafson, M Muench, G Vigna, ...
31st USENIX Security Symposium (USENIX Security 22), 1239-1256, 2022
552022
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
262017
Quantifying the effects of removing permissions from android applications
K Kennedy, E Gustafson, H Chen
Workshop on Mobile Security Technologies (MoST), 2013
262013
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
252018
Think outside the dataset: Finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
The World Wide Web Conference, 3108-3115, 2019
242019
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
182020
Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization
S Ruoti, S Heidbrink, M O’Neill, E Gustafson, YR Choe
2017 IEEE International Conference on Web Services (ICWS), 862-865, 2017
92017
Shall we play a game?
E Trickel, F Disperati, E Gustafson
CTF-as-a-service for Security Education USENIX Workshop on Advances in …, 2017
72017
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ...
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
42021
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
E Gustafson, P Grosen, N Redini, S Jha, A Continella, R Wang, K Fu, ...
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
32023
Lightning talk-think outside the dataset: finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
Companion Proceedings of The 2019 World Wide Web Conference, 1288-1289, 2019
32019
Towards automatically generating a sound and complete dataset for evaluating static analysis tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
22019
Andlantis: Large-scale Android Dynamic Analysis.
YR Choe, M Bierma, JL Erickson, DJ Fritz, E Gustafson
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2014
22014
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
ED Gustafson
University of California, Santa Barbara, 2020
12020
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20