Volgen
Chad Spensky
Chad Spensky
CEO, Allthenticate
Geverifieerd e-mailadres voor allthenticate.net - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th {USENIX} Security Symposium ({USENIX} Security 17), 1007-1024, 2017
1122017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
AU Machiry, ED Gustafson, CU Spensky, CU Salls, NU Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
1092016
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
912019
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
612020
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
2019 Network and Distributed Systems Security Symposium (NDSS), 1-15, 2019
612019
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
492016
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
492016
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. PeriScope: An Effective Probing and Fuzzing Framework for the …
D Song, F Hetzelt, D Das, C Spensky
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
352019
Systems and methods for single device authentication
H Hu, CS Spensky
US Patent App. 15/178,320, 2017
272017
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
162016
Discovering access-control misconfigurations: New approaches and evaluation methodologies
L Bauer, Y Liang, MK Reiter, C Spensky
Proceedings of the second ACM conference on Data and Application Security …, 2012
162012
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
152021
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
132009
The leakage-resilience dilemma
BC Ward, R Skowyra, C Spensky, J Martin, H Okhravi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
102019
Glitching demystified: analyzing control-flow-based glitching attacks and defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
72021
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019
62019
TRUST. IO: protecting physical interfaces on cyber-physical systems
C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
42020
Using open-source hardware to support disadvantaged communications
A Weinert, H Hu, C Spensky, B Bullough
2015 IEEE Global Humanitarian Technology Conference (GHTC), 79-86, 2015
42015
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
A Yerukhimovich, R Balebako, A Boustead, RK Cunningham, W Welser IV, ...
Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States, 2016
32016
Analyzing and securing embedded systems
CS Spensky
University of California, Santa Barbara, 2020
22020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20