USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 7 results:
Filters: Author is Tiffany Bao [Clear All Filters]
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation. 32nd USENIX Security Symposium (USENIX Security 23). :5791--5808.
.
2023. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. 31st USENIX Security Symposium (USENIX Security 22). :413--430.
.
2022. Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. 31st USENIX Security Symposium (USENIX Security 22). :377--394.
.
2022. Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. 31st USENIX Security Symposium (USENIX Security 22). :71--88.
.
2022. Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. 30th USENIX Security Symposium (USENIX Security 21). :4169--4186.
.
2021. Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
.
2020. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. 23rd USENIX Security Symposium (USENIX Security 14). :845--860.
.
2014.