All Publications


Evaluating Synthetic Bugs

  • Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek
  • Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)
  • PDF

SoK: Enabling Security Analyses of Embedded Systems via Rehosting

  • Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Olienik, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson
  • Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)
  • PDF

ERASER: Your Data Won't Be Back

  • Kaan Onarlioglu, William Robertson, Engin Kirda
  • Proceedings of the IEEE European Symposium on Security and Privacy (EuroSP)
  • PDF