Follow
Christopher Salls
Christopher Salls
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
11922016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11172016
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2002017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1252017
Rise of the hacrs: Augmenting autonomous cyber reasoning systems with human assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
692017
Neurlux: dynamic malware analysis without feature engineering
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
642019
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
Token-Level Fuzzing
C Salls, C Jindal, J Corina, C Kruegel, G Vigna
30th USENIX Security Symposium (USENIX Security 21), 2795–2809, 2021
152021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
102020
Piston: Uncooperative remote runtime patching
C Salls, Y Shoshitaishvili, N Stephens, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
Exploiting CVE-2017-5123 with full protections. SMEP, SMAP, and the Chrome Sandbox
C Salls
52017
Fuzzing and Symbolic Execution to Identify and Patch Bugs
CA Salls
University of California, Santa Barbara, 2020
2020
Neurlux
C Jindal, C Salls, H Aghakhani, K Long, C Kruegel, G Vigna
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2019
DIFUZE
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
YR Choe, A Machiry, ED Gustafson, C Spensky, C Salls, N Stephens, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2016
2016
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
The system can't perform the operation now. Try again later.
Articles 1–16