Follow
Christopher Salls
Christopher Salls
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
8912016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
8612016
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1312017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
942017
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
522017
Neurlux: dynamic malware analysis without feature engineering
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
362019
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
182018
Token-Level Fuzzing
C Salls, C Jindal, J Corina, C Kruegel, G Vigna
30th USENIX Security Symposium (USENIX Security 21), 2795-2809, 2021
82021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
62020
Piston: Uncooperative remote runtime patching
C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
52017
Fuzzing and Symbolic Execution to Identify and Patch Bugs
CA Salls
University of California, Santa Barbara, 2020
2020
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
The system can't perform the operation now. Try again later.
Articles 1–13