Publications
  • . Using Safety Properties to Generate Vulnerability Patches. To appear in the proceedings of the 40th IEEE Symposium on Security and Privacy (S&P). .
  • . Rapidly Mitigating Vulnerabilities with Security Workarounds. To appear in the proceedings of the 2nd NDSS Workshop on Binary Analysis Research (BAR). .
  • Pearl-TEE: Supporting Untrusted Applications in TrustZone. In the proceedings of the 3rd ACM CCS Workshop on System Software for Trusted Execution (SysTEX). . [PDF][Bib]
  • . Senx: Semantically Correct Patch Generation for Security Vulnerabilities. arXiv:1711.11136. . [PDF][Bib]
  • . BinPro: A Tool for Binary Source Code Provenance. arXiv:1711.00830. . [PDF][Bib]
  • . Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P). . (Acceptance Rate: 13.3%, 55 out of 413) [PDF][Bib]
  • . LMP: Light-Weighted Memory Protection with Hardware Assistance. In Proceedings of the 2016 Annual Computer Security Application Conference (ACSAC). . (Acceptance Rate: 22.8%, 48 out of 210) [PDF][Bib]
  • . Ocasta: Clustering Configuration Settings For Error Recovery. In Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Pages 479-490. . (Acceptance Rate: 30.3%, 56 out of 185) [PDF][Bib]
  • . PScout: Analyzing the Android Permission Specification. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS). Pages 217-228. . (Acceptance Rate: 18.9%, 80 out of 423) [PDF][Bib]
  • A Look at SmartPhone Permission Models. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM). Pages 63-67. . [PDF][Bib]