CSAIL Technical Reports (July 1, 2003 - present): Recent submissions
Now showing items 13-15 of 776
-
Precise and Comprehensive Provenance Tracking for Android Devices
(2019-11-19)Detailed information about the paths that data take through a system is invaluable for understanding sources and behaviors of complex exfiltration malware. We present a new system, ClearScope, that tracks, at the level of ... -
Faster Dynamic Controllability Checking in Temporal Networks with Integer Bounds
(International Joint Conference in Artificial Intelligence, 2019-08)Simple Temporal Networks with Uncertainty (STNUs) provide a useful formalism with which to reason about events and the temporal constraints that apply to them. STNUs are in particular notable because they facilitate reasoning ... -
Automatic Exploitation of Fully Randomized Executables
(2019-06-11)We present Marten, a new end to end system for automatically discovering, exploiting, and combining information leakage and buffer overflow vulnerabilities to derandomize and exploit remote, fully randomized processes. ...