Tod Amon (Sandia National Laboratories), Tim Loffredo (Sandia National Laboratories)
Creating Human Readable Path Constraints from Symbolic Execution
View More Papers
Symbolic Path Tracing to Find Android Permission-Use Triggers
Kristopher Micinski (Haverford College), Thomas Gilray (University of Alabama, Birmingham), Daniel Votipka (University of Maryland), Michelle L. Mazurek (University of Maryland), Jeffrey S. Foster (Tufts University)
Read MoreGTrans: Graph Transformer-Based Obfuscation-resilient Binary Code Similarity Detection
Yun Zhang (Hunan University), Yuling Liu (Hunan University), Ge Cheng (Xiangtan University), Bo Ou (Hunan University)
Read MoreFinding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic...
Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Read MoreA Heuristic Approach to Detect Opaque Predicates that Disrupt...
Yu-Jye Tung (University of California, Irvine), Ian Harris (University of California Irvine)
Read More