Æȷοì
Pongsin Poosankam
Pongsin Poosankam
cbs.chula.ac.thÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 ¡¦, 2008
10742008
Renovo: A hidden code extractor for packed executables
MG Kang, P Poosankam, H Yin
Proceedings of the 2007 ACM workshop on Recurring malcode, 46-53, 2007
4512007
Dta++: dynamic taint analysis with targeted control-flow propagation.
MG Kang, S McCamant, P Poosankam, D Song
NDSS, 2011
4142011
Automatic patch-based exploit generation is possible: Techniques and implications
D Brumley, P Poosankam, D Song, J Zheng
2008 IEEE Symposium on Security and Privacy (sp 2008), 143-157, 2008
4072008
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
J Caballero, P Poosankam, C Kreibich, D Song
Proceedings of the 16th ACM conference on Computer and communications ¡¦, 2009
3552009
Loop-extended symbolic execution on binary programs
P Saxena, P Poosankam, S McCamant, D Song
Proceedings of the eighteenth international symposium on Software testing ¡¦, 2009
2402009
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
P Saxena, S Hanna, P Poosankam, D Song
NDss, 2010
2052010
{MACE}:{Model-inference-Assisted} concolic exploration for protocol and vulnerability discovery
CY Cho, D Babić, P Poosankam, KZ Chen, EXJ Wu, D Song
20th USENIX Security Symposium (USENIX Security 11), 2011
1652011
BitScope: Automatically dissecting malicious binaries
D Brumley, C Hartwig, MG Kang, Z Liang, J Newsome, P Poosankam, ...
Technical Report CS-07-133, School of Computer Science, Carnegie Mellon ¡¦, 2007
1162007
Path-exploration lifting: Hi-fi tests for lo-fi emulators
L Martignoni, S McCamant, P Poosankam, D Song, P Maniatis
ACM SIGARCH Computer Architecture News 40 (1), 337-348, 2012
1102012
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
2011 IEEE Symposium on Security and Privacy, 347-362, 2011
1042011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
S Hanna, R Rolles, A Molina-Markham, P Poosankam, J Blocki, K Fu, ...
HealthSec, 2011
962011
Input generation via decomposition and re-stitching: Finding bugs in malware
J Caballero, P Poosankam, S McCamant, D Babi ć, D Song
Proceedings of the 17th ACM conference on Computer and communications ¡¦, 2010
922010
FiG: Automatic fingerprint generation
J Caballero, S Venkataraman, P Poosankam, MG Kang, D Song, A Blum
Carnegie Mellon University, 2007
842007
Hookscout: Proactive binary-centric hook detection
H Yin, P Poosankam, S Hanna, D Song
International Conference on Detection of Intrusions and Malware, and ¡¦, 2010
512010
Cloud terminal: Secure access to sensitive applications from untrusted systems
L Martignoni, P Poosankam, M Zaharia, J Han, S McCamant, D Song, ...
2012 USENIX Annual Technical Conference (USENIX ATC 12), 165-182, 2012
492012
Design space and analysis of worm defense strategies
D Brumley, LH Liu, P Poosankam, D Song
Proceedings of the 2006 ACM Symposium on Information, computer and ¡¦, 2006
482006
Crash analysis with BitBlaze
C Miller, J Caballero, NM Johnson, MG Kang, S McCamant, ...
at BlackHat USA, 2010
422010
Towards generating high coverage vulnerability-based signatures with protocol-level constraint-guided exploration
J Caballero, Z Liang, P Poosankam, D Song
Recent Advances in Intrusion Detection: 12th International Symposium, RAID ¡¦, 2009
352009
BitBlaze: Binary analysis for computer security
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
102013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20