Follow
Christopher Salls
Christopher Salls
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
13332016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
12102016
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2212017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1482017
Neurlux: dynamic malware analysis without feature engineering
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
772019
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
742017
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
292018
Token-Level Fuzzing
C Salls, C Jindal, J Corina, C Kruegel, G Vigna
30th USENIX Security Symposium (USENIX Security 21), 2795–2809, 2021
192021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
112020
Piston: Uncooperative remote runtime patching
C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox!
C Salls
62017
Neurlux
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
12019
Fuzzing and Symbolic Execution to Identify and Patch Bugs
CA Salls
University of California, Santa Barbara, 2020
2020
DIFUZE
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
The system can't perform the operation now. Try again later.
Articles 1–16