Suivre
Carter Yagemann
Titre
Citée par
Citée par
Année
Enforcing unique code target property for control-flow integrity
H Hu, C Qian, C Yagemann, SPH Chung, WR Harris, T Kim, W Lee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1322018
{ARCUS}: symbolic root cause analysis of exploits in production systems
C Yagemann, M Pruett, SP Chung, K Bittick, B Saltaformaggio, W Lee
30th USENIX Security Symposium (USENIX Security 21), 1989-2006, 2021
272021
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces
C Yagemann, S Sultana, L Chen, W Lee
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
162019
Automated bug hunting with data-driven symbolic root cause analysis
C Yagemann, SP Chung, B Saltaformaggio, W Lee
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
142021
Validating the integrity of audit logs against execution repartitioning attacks
C Yagemann, MA Noureddine, WU Hassan, S Chung, A Bates, W Lee
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
112021
VulChecker: Graph-based Vulnerability Localization in Source Code
Y Mirsky, G Macon, M Brown, C Yagemann, M Pruett, E Downing, ...
102023
Intentio ex machina: Android intent access control via an extensible application hook
C Yagemann, W Du
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
102016
Cryptographic key derivation from biometric inferences for remote authentication
E Uzun, C Yagemann, S Chung, V Kolesnikov, W Lee
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
92021
On the feasibility of automating stock market manipulation
C Yagemann, SP Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
92020
Intent firewall
C Yagemann
URL: http://www. cis. syr. edu/~ wedu/androi d/IntentFirewall, 2015
82015
MLsploit: a framework for interactive experimentation with adversarial machine learning research
N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ...
Proc. of the 25th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2019
52019
Privacy preserving face-based authentication
PH Chung, W Lee, E Uzun, C Yagemann
US Patent 11,494,476, 2022
42022
Modeling large-scale manipulation in open stock markets
C Yagemann, PH Chung, E Uzun, S Ragam, B Saltaformaggio, W Lee
IEEE Security & Privacy 19 (6), 58-65, 2021
32021
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis.
L Chen, C Yagemann, E Downing
CVPR Workshops, 48-52, 2019
32019
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
C Yagemann, SP Chung, B Saltaformaggio, W Lee
12023
Privacy preserving face-based authentication
PH Chung, W Lee, E Uzun, C Yagemann
US Patent 11,874,911, 2024
2024
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating
MS Anwar, C Zuo, C Yagemann, Z Lin
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
2023
Hardware-Assisted Processor Tracing for Automated Bug Finding and Exploit Prevention.
C Yagemann
Georgia Institute of Technology, Atlanta, GA, USA, 2022
2022
MLsploit: A Cloud-Based Framework for Adversarial Machine Learning Research
N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ...
Black Hat Asia 2019, 2019
2019
Augmenting Cyber Assessment through Dynamic Malware Analyzer
A Kam, M Nance, W Lee, K Park, B Sahin, C Yagemann
2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20