My Papers

  • 2020 - USENIX - PhishTime.pdf
  • 2020 - SP - KARONTE.pdf
  • 2020 - MobiSys - SmokeBomb.pdf
  • 2020 - CNS - Exploring Abstraction Functions in Fuzzing.pdf
  • 2019 - DIMVA - Bintrimmer.pdf
  • 2019 - CODASPY - Bootkeeper.pdf
  • 2019 - CCS - Matched and Mismatched SOCs.pdf
  • 2019 - ACSAC - Sleak.pdf
  • 2018 - USENIX Security - HeapHopper.pdf
  • 2018 - SP Magazine - Mechanical Phish.pdf
  • 2018 - SP - T-Fuzz.pdf
  • 2018 - SDN NFV - Challenges and Preparedness of SDN Firewalls.pdf
  • 2018 - Langsec.pdf
  • 2018 - CCS - AIM-SDN.pdf
  • 2018 - ASHES - Cachelight.pdf
  • 2018 - ACSAC - WiNotCalling.pdf
  • 2017 - USENIX Security - Bootstomp.pdf
  • 2017 - SP - Your Exploit is Mine.pdf
  • 2017 - Phrack - Cyber Grand Shellphish.pdf
  • 2017 - NDSS - Ramblr.pdf
  • 2017 - CSF - How Shall We Play a Game.pdf
  • 2017 - CCS - Rise of the HaCRS.pdf
  • 2017 - CCS - DIFUZE.pdf
  • 2017 - ACSAC - Piston.pdf
  • 2016 - SP - State of the Art of War.pdf
  • 2016 - RAID - Taming Transactions.pdf
  • 2016 - NDSS - Firmalice.pdf
  • 2016 - NDSS - Driller.pdf
  • 2015 - USENIX Security - How the ELF Ruined Christmas.pdf
  • 2015 - PETS - Portrait of a Privacy Invasion.pdf
  • 2014 - SAC - Do You Feel Lucky.pdf
  • 2014 - RAID - Protecting Web-Based Single Sign-On Protocols.pdf
  • 2014 - DIMVA - PEXy.pdf
  • 2014 - 3GSE - Ten Years of iCTF.pdf
  • 2013 - USENIX Security - Steal This Movie.pdf
  • 2013 - USENIX Security - Revolver.pdf
  • 2012 - CCS - Blacksheep.pdf
  • 2011 - GSWC - Back to the Future.pdf