Seguir
Tiffany Bao
Tiffany Bao
Dirección de correo verificada de asu.edu
Título
Citado por
Citado por
Año
ByteWeight: Learning to Recognize Functions in Binary Code
T Bao, J Burket, M Woo, R Turner, D Brumley
USENIX Security, 845-860, 2014
3312014
Matched and mismatched SOCs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1162019
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
The Network and Distributed System Security Symposium, 2020
1132020
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
IEEE Symposium on Security and Privacy, 2021
812021
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
T Bao, R Wang, Y Shoshitaishvili, D Brumley
38th IEEE Symposium on Security and Privacy, 2017
732017
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
652020
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
ST Dinh, H Cho, K Martin, A Oest, K Zeng, A Kapravelos, GJ Ahn, T Bao, ...
NDSS, 2021
452021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
Symposium on Electronic Crime Research, 2020
432020
Expected exploitability: Predicting the development of functional vulnerability exploits
O Suciu, C Nelson, Z Lyu, T Bao, T Dumitraș
31st USENIX Security Symposium (USENIX Security 22), 377-394, 2022
372022
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities
E Trickel, F Pagani, C Zhu, L Dresel, G Vigna, C Kruegel, R Wang, T Bao, ...
2023 IEEE symposium on security and privacy (SP), 2658-2675, 2023
252023
SoK: Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
J Pakki, Y Shoshitaishvili, R Wang, T Bao, A Doupé
Financial Cryptography and Data Security, 2021
21*2021
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
212019
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
K Zeng, Y Chen, H Cho, X Xing, A Doupé, Y Shoshitaishvili, T Bao
31st USENIX Security Symposium (USENIX Security 22), 71-88, 2022
202022
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs
J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ...
31st USENIX Security Symposium (USENIX Security 22), 413-430, 2022
192022
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
172021
How Shall We Play a Game: A Game-Theoretical Model for Cyber-warfare Games
T Bao, Y Shoshitaishvili, R Wang, C Kruegel, G Vigna, D Brumley
30th IEEE Computer Security Foundations Symposium, 2017
172017
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
H Cho, J Park, J Kang, T Bao, R Wang, Y Shoshitaishvili, A Doupé, ...
14th USENIX Workshop on Offensive Technologies, 2020
162020
SyML: Guiding symbolic execution toward vulnerable states through pattern learning
N Ruaro, K Zeng, L Dresel, M Polino, T Bao, A Continella, S Zanero, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
132021
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers
A Soneji, FB Kokulu, C Rubio-Medrano, T Bao, R Wang, Y Shoshitaishvili, ...
2022 IEEE Symposium on Security and Privacy (SP), 1845-1862, 2022
112022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20