Now showing items 13-15 of 776

    • Precise and Comprehensive Provenance Tracking for Android Devices 

      Gordon, Michael; Eikenberry, Jordan; Eden, Anthony; Perkins, Jeff; Rinard, Martin (2019-11-19)
      Detailed information about the paths that data take through a system is invaluable for understanding sources and behaviors of complex exfiltration malware. We present a new system, ClearScope, that tracks, at the level of ...
    • Faster Dynamic Controllability Checking in Temporal Networks with Integer Bounds 

      Bhargava, Nikhil; Williams, Brian C. (International Joint Conference in Artificial Intelligence, 2019-08)
      Simple Temporal Networks with Uncertainty (STNUs) provide a useful formalism with which to reason about events and the temporal constraints that apply to them. STNUs are in particular notable because they facilitate reasoning ...
    • Automatic Exploitation of Fully Randomized Executables 

      Gadient, Austin; Ortiz, Baltazar; Barrato, Ricardo; Davis, Eli; Perkins, Jeff; e.a. (2019-06-11)
      We present Marten, a new end to end system for automatically discovering, exploiting, and combining information leakage and buffer overflow vulnerabilities to derandomize and exploit remote, fully randomized processes. ...