SYMBION: Interleaving Symbolic with Concrete Execution

To appear in the Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2020.

PDF Slides

Back to the whiteboard: a principled approach for the assessment and design of memory forensic techniques

Proceedings of the USENIX Security Symposium (USENIX Security), 2019.

PDF Slides Code

Introducing the temporal dimension to memory forensics

ACM Transactions on Privacy and Security (TOPS), 2019.

PDF Code

Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis

Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2018.

PDF Slides Artifacts

Taming transactions: Towards hardware-assisted control flow integrity using transactional memory

Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2016.

PDF Slides Code

Measuring the Role of Greylisting and Nolisting in Fighting Spam

Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

PDF Slides

When hardware meets software: A bulletproof solution to forensic memory acquisition

Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2012.

PDF Slides