Media Summary: Hang Zhang University of California, Riverside Abstract: Patching is the main resort to battle SymFit: Making the Common (Concrete) Case Fast for

Usenix Security 14 Blanket Execution Dynamic Similarity Testing For Program Binaries - Detailed Analysis & Overview

Hang Zhang University of California, Riverside Abstract: Patching is the main resort to battle SymFit: Making the Common (Concrete) Case Fast for

Photo Gallery

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries
USENIX Security '22 - Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery...
USENIX Security '24 - SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic...
USENIX Security '17 - BinSim: Trace-based Semantic Binary Diffing...
USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better
USENIX Security '24 - BeeBox: Hardening BPF against Transient Execution Attacks
USENIX Security '22 - Increasing Adversarial Uncertainty to Scale Private Similarity Testing
USENIX Security '23 - FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules
USENIX Security '23 - Smart Learning to Find Dumb Contracts
USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation
Sponsored
View Detailed Profile
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

Blanket Execution

USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications

USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications

X-Force: Force-Executing

USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries

USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries

Hang Zhang University of California, Riverside Abstract: Patching is the main resort to battle

USENIX Security '22 - Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery...

USENIX Security '22 - Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery...

USENIX Security

USENIX Security '24 - SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic...

USENIX Security '24 - SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic...

SymFit: Making the Common (Concrete) Case Fast for

Sponsored
USENIX Security '17 - BinSim: Trace-based Semantic Binary Diffing...

USENIX Security '17 - BinSim: Trace-based Semantic Binary Diffing...

BinSim: Trace-based Semantic

USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better

USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better

USENIX Security

USENIX Security '24 - BeeBox: Hardening BPF against Transient Execution Attacks

USENIX Security '24 - BeeBox: Hardening BPF against Transient Execution Attacks

BeeBox: Hardening BPF against Transient

USENIX Security '22 - Increasing Adversarial Uncertainty to Scale Private Similarity Testing

USENIX Security '22 - Increasing Adversarial Uncertainty to Scale Private Similarity Testing

USENIX Security

USENIX Security '23 - FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules

USENIX Security '23 - FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules

USENIX Security

USENIX Security '23 - Smart Learning to Find Dumb Contracts

USENIX Security '23 - Smart Learning to Find Dumb Contracts

USENIX Security

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security

USENIX Security '23 - ICSPatch: Automated Vulnerability Localization and Non-Intrusive...

USENIX Security '23 - ICSPatch: Automated Vulnerability Localization and Non-Intrusive...

USENIX Security