Brendan Saltaformaggio

According to our database1, Brendan Saltaformaggio authored at least 36 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware.
Proceedings of the 32nd USENIX Security Symposium, 2023

PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Invited Tutorial: Counteracting Web Application Abuse in Malware.
Proceedings of the IEEE Secure Development Conference, 2023

2022
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Modeling Large-Scale Manipulation in Open Stock Markets.
IEEE Secur. Priv., 2021

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Forecasting Malware Capabilities From Cyber Attack Memory Images.
Proceedings of the 30th USENIX Security Symposium, 2021

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Measuring and Preventing Supply Chain Attacks on Package Managers.
CoRR, 2020

TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Feasibility of Automating Stock Market Manipulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends.
Proceedings of the 28th USENIX Security Symposium, 2019

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Gemini: Guest-transparent honey files via hypervisor-level access redirection.
Comput. Secur., 2018

Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Live acquisition of main memory data from Android smartphones and smartwatches.
Digit. Investig., 2017

Self Destructing Exploit Executions via Input Perturbation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

LDX: Causality Inference by Lightweight Dual Execution.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
vRead: Efficient Data Access for Hadoop in Virtualized Clouds.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GUITAR: Piecing Together Android App GUIs from Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

iRiS: Vetting Private API Abuse in iOS Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2011
Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011


  Loading...