Chad Spensky
Chad Spensky
CEO, Allthenticate
Geverifieerd e-mailadres voor allthenticate.net - Homepage
Geciteerd door
Geciteerd door
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th {USENIX} Security Symposium ({USENIX} Security 17), 1007-1024, 2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
AU Machiry, ED Gustafson, CU Spensky, CU Salls, NU Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
2019 Network and Distributed Systems Security Symposium (NDSS), 1-15, 2019
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. PeriScope: An Effective Probing and Fuzzing Framework for the …
D Song, F Hetzelt, D Das, C Spensky
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
Systems and methods for single device authentication
H Hu, CS Spensky
US Patent App. 15/178,320, 2017
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
Discovering access-control misconfigurations: New approaches and evaluation methodologies
L Bauer, Y Liang, MK Reiter, C Spensky
Proceedings of the second ACM conference on Data and Application Security …, 2012
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
The leakage-resilience dilemma
BC Ward, R Skowyra, C Spensky, J Martin, H Okhravi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Glitching demystified: analyzing control-flow-based glitching attacks and defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019
TRUST. IO: protecting physical interfaces on cyber-physical systems
C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Using open-source hardware to support disadvantaged communications
A Weinert, H Hu, C Spensky, B Bullough
2015 IEEE Global Humanitarian Technology Conference (GHTC), 79-86, 2015
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
A Yerukhimovich, R Balebako, A Boustead, RK Cunningham, W Welser IV, ...
Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States, 2016
Analyzing and securing embedded systems
CS Spensky
University of California, Santa Barbara, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20