We examine the problem of aggregating the results of multiple anti-virus (AV) vendors’ detectors into a single authoritative ground-truth label for every binary. To do so, we ad...
Alex Kantchelian, Michael Carl Tschantz, Sadia Afr...
Cryptocurrencies like Bitcoin and the more recent Ethereum system allow users to specify scripts in transactions and contracts to support applications beyond simple cash transacti...
Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek S...
More and more people rely on mobile devices to access the Internet, which also increases the amount of private information that can be gathered from people’s devices. Although t...
Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memor...
David Bigelow, Thomas Hobson, Robert Rudd, William...