Follow
Jessie Grosen
Title
Cited by
Cited by
Year
(State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
891*2016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
Proceedings of the Network and Distributed System Security Symposium, 2016
8612016
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the 24th Annual Symposium on Network and Distributed System …, 2017
1372017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–4