Stephen McCamant

According to our database1, Stephen McCamant authored at least 50 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Java Ranger: Supporting String and Array Operations in Java Ranger (Competition Contribution).
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2023

Structural Test Input Generation for 3-Address Code Coverage Using Path-Merged Symbolic Execution.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

2022
PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Counterexample-Guided Inductive Repair of Reactive Contracts.
Proceedings of the 10th IEEE/ACM International Conference on Formal Methods in Software Engineering, 2022

2021
Finding Substitutable Binary Code By Synthesizing Adapters.
IEEE Trans. Software Eng., 2021

Understanding and Detecting Disordered Error Handling with Precise Function Pairing.
Proceedings of the 30th USENIX Security Symposium, 2021

Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Java Ranger at SV-COMP 2020 (Competition Contribution).
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2020

Structural Bit-vector Model Counting.
Proceedings of the 18th International Workshop on Satisfiability Modulo Theories co-located with the 10th International Joint Conference on Automated Reasoning (IJCAR 2020), 2020

Java Ranger: statically summarizing regions for efficient symbolic execution of Java.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

First Time Miss : Low Overhead Mitigation for Shared Memory Cache Side Channels.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

Efficient and scalable cross-ISA virtualization of hardware transactional memory.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020

2019
New Attacks and Defenses for Randomized Caches.
CoRR, 2019

Program-mandering: Quantitative Privilege Separation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Effect of Instruction Padding on SFI Overhead.
CoRR, 2018

Fast PokeEMU: Scaling Generated Instruction Tests Using Aggregation and State Chaining.
Proceedings of the 14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2018

Bit-Vector Model Counting Using Statistical Estimation.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Contract discovery from black-box components.
Proceedings of the 1st ACM SIGSOFT International Workshop on Automated Specification Inference, 2018

Finding Substitutable Binary Code for Reverse Engineering by Synthesizing Adapters.
Proceedings of the 11th IEEE International Conference on Software Testing, 2018

Enhancing Cross-ISA DBT Through Automatically Learned Translation Rules.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform.
IEEE Trans. Software Eng., 2017

Veritesting Challenges in Symbolic Execution of Java.
ACM SIGSOFT Softw. Eng. Notes, 2017

Finding Semantically-Equivalent Binary Code By Synthesizing Adaptors.
CoRR, 2017

Enabling Cross-ISA Offloading for COTS Binaries.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Toward Rigorous Object-Code Coverage Criteria.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

2016
A General Persistent Code Caching Framework for Dynamic Binary Translation (DBT).
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

2013
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
Proceedings of the Computer Security - ESORICS 2013, 2013

Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011

Statically-directed dynamic automated test generation.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

2010
A Symbolic Execution Framework for JavaScript.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Binary Code Extraction and Interface Identification for Security Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Measuring channel capacity to distinguish undue influence.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Emulating emulation-resistant malware.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

2008
Quantitative information-flow tracking for real systems.
PhD thesis, 2008

Quantitative information flow as network flow capacity.
Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008

2007
The Daikon system for dynamic detection of likely invariants.
Sci. Comput. Program., 2007

A simulation-based proof technique for dynamic information flow.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

2006
Evaluating SFI for a CISC Architecture.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Dynamic inference of abstract types.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

Inference and enforcement of data structure consistency specifications.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

2004
Early Identification of Incompatibilities in Multi-component Upgrades.
Proceedings of the ECOOP 2004, 2004

2003
Predicting problems caused by component upgrades.
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003


  Loading...