Follow
Chad Spensky
Chad Spensky
CEO, Allthenticate
Verified email at allthenticate.net - Homepage
Title
Cited by
Cited by
Year
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
AU Machiry, ED Gustafson, CU Spensky, CU Salls, NU Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
942016
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th {USENIX} Security Symposium ({USENIX} Security 17), 1007-1024, 2017
892017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
732019
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
2019 Network and Distributed Systems Security Symposium (NDSS), 1-15, 2019
502019
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
492016
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
482016
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
432020
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. PeriScope: An Effective Probing and Fuzzing Framework for the …
D Song, F Hetzelt, D Das, C Spensky
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
292019
Systems and methods for single device authentication
H Hu, CS Spensky
US Patent App. 15/178,320, 2017
232017
Discovering access-control misconfigurations: New approaches and evaluation methodologies
L Bauer, Y Liang, MK Reiter, C Spensky
Proceedings of the second ACM conference on Data and Application Security …, 2012
162012
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
142016
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
International Conference on Information Systems Security, 132-147, 2009
132009
The leakage-resilience dilemma
BC Ward, R Skowyra, C Spensky, J Martin, H Okhravi
European Symposium on Research in Computer Security, 87-106, 2019
92019
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
72021
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019
62019
Glitching demystified: analyzing control-flow-based glitching attacks and defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
52021
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
A Yerukhimovich, R Balebako, A Boustead, RK Cunningham, W Welser IV, ...
Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States, 2016
42016
Using open-source hardware to support disadvantaged communications
A Weinert, H Hu, C Spensky, B Bullough
2015 IEEE Global Humanitarian Technology Conference (GHTC), 79-86, 2015
42015
TRUST. IO: protecting physical interfaces on cyber-physical systems
C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
32020
Analyzing and securing embedded systems
CS Spensky
University of California, Santa Barbara, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20