Chad Spensky

According to our database1, Chad Spensky authored at least 18 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2021
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Conware: Automated Modeling of Hardware Peripherals.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Analyzing and Securing Embedded Systems.
PhD thesis, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Evolutionary computation for improving malware analysis.
Proceedings of the 6th International Workshop on Genetic Improvement, 2019

The Leakage-Resilience Dilemma.
Proceedings of the Computer Security - ESORICS 2019, 2019

2017
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Proceedings of the 26th USENIX Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
SoK: Privacy on Mobile Devices - It's Complicated.
Proc. Priv. Enhancing Technol., 2016

Towards Transparent Introspection.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Using open-source hardware to support disadvantaged communications.
Proceedings of the 2015 IEEE Global Humanitarian Technology Conference, 2015

2012
Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2009
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.
Proceedings of the Information Systems Security, 5th International Conference, 2009


  Loading...