Eric Gustafson

According to our database1, Eric Gustafson authored at least 17 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the World Wide Web Conference, 2019

Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Tracking Provenance in Decision Making Between the Human and Autonomy.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2018

Command and Control Collaboration Sand Table (C2-CST).
Proceedings of the Virtual, Augmented and Mixed Reality: Applications in Health, Cultural Heritage, and Industry, 2018

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Shell We Play A Game? CTF-as-a-service for Security Education.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Mixing Formal Methods, Machine Learning, and Human Interaction Through an Autonomics Framework.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2014
Andlantis: Large-scale Android Dynamic Analysis.
CoRR, 2014

2011
Immunoinformatic discovery of potential cross-reactive T cell epitopes in the measles genome.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Generation of novel Chagas vaccines: evolving studies/work in progress.
Proceedings of the ACM International Conference on Bioinformatics, 2011


  Loading...