Eric Gustafson
Eric Gustafson
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
622017
Andlantis: Large-scale Android dynamic analysis
M Bierma, E Gustafson, J Erickson, D Fritz, YR Choe
arXiv preprint arXiv:1410.7751, 2014
462014
Bootstomp: on the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 781-798, 2017
292017
Shell we play a game? CTF-as-a-service for security education
E Trickel, F Disperati, E Gustafson, F Kalantari, M Mabey, N Tiwari, ...
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
262017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
242019
Quantifying the effects of removing permissions from android applications
K Kennedy, E Gustafson, H Chen
Workshop on Mobile Security Technologies (MoST), 2013
242013
HALucinator: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 1201-1218, 2020
122020
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
112017
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
82018
Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization
S Ruoti, S Heidbrink, M O’Neill, E Gustafson, YR Choe
2017 IEEE International Conference on Web Services (ICWS), 862-865, 2017
52017
Think outside the dataset: Finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
The World Wide Web Conference, 3108-3115, 2019
42019
SYMBION: Interleaving Symbolic with Concrete Execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
22020
Andlantis: Large-scale Android Dynamic Analysis.
YR Choe, M Bierma, JL Erickson, DJ Fritz, E Gustafson
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2014
22014
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
ED Gustafson
UC Santa Barbara, 2020
2020
HALucinator v. 1.0
AA Clements, ED Gustafson
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2019
2019
Lightning Talk-Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
Companion Proceedings of The 2019 World Wide Web Conference, 1288-1289, 2019
2019
Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
2019
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
YR Choe, A Machiry, N Redini, ED Gustafson, Y Fratantonio, YR Choe, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2018
2018
Understanding IoT Security.
T Nguyen, ED Gustafson, J Wampler
Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2017
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20