Marcel Busch (Friedrich-Alexander-Universität Erlangen-Nürnberg), Kalle Dirsch (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Finding 1-Day Vulnerabilities in Trusted Applications using Selective Symbolic Execution
View More Papers
QSynth – A Program Synthesis based approach for Binary...
Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
Read MoreEfficient Normalized Reduction and Generation of Equivalent Multivariate Binary...
Arnau Gàmez-Montolio (City, University of London; Activision Research), Enric Florit (Universitat de Barcelona), Martin Brain (City, University of London), Jacob M. Howe (City, University of London)
Read MoreBeyond the Bytes: Understanding the Limitations of Intrinsic Binary...
Peter Lafosse (Owner and Co-Founder of Vector 35 Inc.)
Read Moreo-glassesX: Compiler Provenance Recovery with Attention Mechanism from a...
Yuhei Otsubo (National Police Agency, Tokyo, Japan), Akira Otsuka (Institute of information Security, Japan), Mamoru Mimura (National Defense Academy, Japan), Takeshi Sakaki (The University of Tokyo, Japan), Hiroshi Ukegawa (National Police Agency, Tokyo, Japan)
Read More