Rebecca Shapiro

According to our database1, Rebecca Shapiro authored at least 10 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
PolyDoc: Surveying PDF Files from the PolySwarm network.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

2020
Ghostbusting: mitigating spectre with intraprocess memory isolation.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2018
Types for the Chain of Trust: No (Loader) Write Left Behind.
PhD thesis, 2018

2014
Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier.
IEEE Secur. Priv., 2014

Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

The Page-Fault Weird Machine: Lessons in Instruction-less Computation.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

Electronic Prescription for Controlled Substances: A Cybersecurity Perspective.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

2011
Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing.
Proceedings of the Critical Infrastructure Protection V, 2011


  Loading...