Sam L. Thomas

According to our database1, Sam L. Thomas authored at least 8 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Cutting Through the Complexity of Reverse Engineering Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Finding Software Bugs in Embedded Devices.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2018
Backdoor detection systems for embedded devices.
PhD thesis, 2018

Backdoors: Definition, Deniability and Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality.
Proceedings of the Computer Security - ESORICS 2017, 2017

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017


  Loading...