Drew Davidson
Drew Davidson
Email verificata su ku.edu - Home page
Titolo
Citata da
Citata da
Anno
{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution
D Davidson, B Moench, T Ristenpart, S Jha
22nd {USENIX} Security Symposium ({USENIX} Security 13), 463-478, 2013
1372013
Controlling UAVs with sensor input spoofing attacks
D Davidson, H Wu, R Jellinek, V Singh, T Ristenpart
10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016
722016
Automatic Generation of Remediation Procedures for Malware Infections.
R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, JT Giffin, ...
USENIX Security Symposium, 419-434, 2010
502010
Morepriv: Mobile os support for application personalization and privacy
D Davidson, M Fredrikson, B Livshits
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
412014
Cimplifier: automatically debloating containers
V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
272017
Secure integration of web content and applications on commodity mobile operating systems
D Davidson, Y Chen, F George, L Lu, S Jha
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
142017
Protocol normalization using attribute grammars
D Davidson, R Smith, N Doyle, S Jha
European Symposium on Research in Computer Security, 216-231, 2009
112009
Enhancing Android Security Through App Splitting
D Davidson, V Rastogi, M Christodorescu, S Jha
International Conference on Security and Privacy in Communication Systems, 24-44, 2017
22017
Towards least privilege containers with cimplifier
V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel
arXiv preprint arXiv:1602.08410, 2016
12016
MoRePriv: Mobile OS-Wide Application Personalization
D Davidson, B Livshits
Microsoft Research, Redmond, WA, 2012
12012
Towards Enforceable Data-Driven Privacy Policies
M Fredrikson, D Davidson, S Jha, B Livshits
Web 2.0 Workshop on Security and Privacy, 2011
12011
FiE on Firmware
D Davidson, B Moench, S Jha, T Ristenpart
Finding vulnerabilities in embedded systems using symbolic execution, 0
1
 Roberto Paleari, Emanuele Passerini
L Martignoni, D Davidson, M Fredrikson, S Jha, J Giffin
MoST Committees
H Chen, L Koved, L Lu, D Barrera, R Cannings, L Cavallaro, ...
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14