Follow
Eric Gustafson
Eric Gustafson
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
942017
{HALucinator}: Firmware Re-hosting Through Abstraction Layer Emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
772020
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
732019
Andlantis: Large-scale Android dynamic analysis
M Bierma, E Gustafson, J Erickson, D Fritz, YR Choe
arXiv preprint arXiv:1410.7751, 2014
572014
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
502017
Shell We Play A Game?{CTF-as-a-service} for Security Education
E Trickel, F Disperati, E Gustafson, F Kalantari, M Mabey, N Tiwari, ...
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
462017
Quantifying the effects of removing permissions from android applications
K Kennedy, E Gustafson, H Chen
Workshop on Mobile Security Technologies (MoST), 2013
242013
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
202017
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
172018
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
112020
Think outside the dataset: Finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
The World Wide Web Conference, 3108-3115, 2019
112019
Shall we play a game?
E Trickel, F Disperati, E Gustafson
CTF-as-a-service for Security Education USENIX Workshop on Advances in …, 2017
72017
Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization
S Ruoti, S Heidbrink, M O’Neill, E Gustafson, YR Choe
2017 IEEE International Conference on Web Services (ICWS), 862-865, 2017
52017
Andlantis: Large-scale Android Dynamic Analysis.
YR Choe, M Bierma, JL Erickson, DJ Fritz, E Gustafson
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2014
22014
Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing
T Scharnowski, N Bars, M Schloegel, E Gustafson, M Muench, G Vigna, ...
31st USENIX Security Symposium (USENIX Security 22), 1239-1256, 2022
12022
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ...
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
12021
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
ED Gustafson
UC Santa Barbara, 2020
12020
Lightning Talk-Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
Companion Proceedings of The 2019 World Wide Web Conference, 1288-1289, 2019
12019
Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
12019
HALucinator v. 1.0
AA Clements, ED Gustafson
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20