Obserwuj
Chad Spensky
Chad Spensky
CEO, Allthenticate
Zweryfikowany adres z allthenticate.net - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
26th {USENIX} Security Symposium ({USENIX} Security 17), 1007-1024, 2017
1022017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
AU Machiry, ED Gustafson, CU Spensky, CU Salls, NU Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
1012016
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson
22nd International Symposium on Research in Attacks, Intrusions and Defenses, 2019
852019
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
522020
Periscope: An effective probing and fuzzing framework for the hardware-os boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
2019 Network and Distributed Systems Security Symposium (NDSS), 1-15, 2019
522019
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
492016
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
472016
Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. PeriScope: An Effective Probing and Fuzzing Framework for the …
D Song, F Hetzelt, D Das, C Spensky
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
302019
Systems and methods for single device authentication
H Hu, CS Spensky
US Patent App. 15/178,320, 2017
242017
Discovering access-control misconfigurations: New approaches and evaluation methodologies
L Bauer, Y Liang, MK Reiter, C Spensky
Proceedings of the second ACM conference on Data and Application Security …, 2012
162012
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
142016
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
MK Reiter, V Sekar, C Spensky, Z Zhang
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
132009
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
112021
The leakage-resilience dilemma
BC Ward, R Skowyra, C Spensky, J Martin, H Okhravi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
102019
Glitching demystified: analyzing control-flow-based glitching attacks and defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
72021
Evolutionary computation for improving malware analysis
K Leach, R Dougherty, C Spensky, S Forrest, W Weimer
2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019
62019
Using open-source hardware to support disadvantaged communications
A Weinert, H Hu, C Spensky, B Bullough
2015 IEEE Global Humanitarian Technology Conference (GHTC), 79-86, 2015
42015
TRUST. IO: protecting physical interfaces on cyber-physical systems
C Spensky, A Machiry, M Busch, K Leach, R Housley, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
32020
Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices
A Yerukhimovich, R Balebako, A Boustead, RK Cunningham, W Welser IV, ...
Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States, 2016
32016
Analyzing and securing embedded systems
CS Spensky
University of California, Santa Barbara, 2020
22020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20