Carter Yagemann

Orcid: 0000-0002-8018-0341

According to our database1, Carter Yagemann authored at least 14 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Proceedings of the 32nd USENIX Security Symposium, 2023

VulChecker: Graph-based Vulnerability Localization in Source Code.
Proceedings of the 32nd USENIX Security Symposium, 2023

Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Hardware-Assisted Processor Tracing for Automated Bug Finding and Exploit Prevention.
PhD thesis, 2022

2021
Modeling Large-Scale Manipulation in Open Stock Markets.
IEEE Secur. Priv., 2021

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
On the Feasibility of Automating Stock Market Manipulation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Proceedings of the Information Security - 22nd International Conference, 2019

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

2018
Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook.
Proceedings of the Computer Security - ESORICS 2016, 2016


  Loading...