Eric Gustafson
Eric Gustafson
Verified email at - Homepage
Cited by
Cited by
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
Fuzzware: Using precise {MMIO} modeling for effective firmware fuzzing
T Scharnowski, N Bars, M Schloegel, E Gustafson, M Muench, G Vigna, ...
31st USENIX Security Symposium (USENIX Security 22), 1239-1256, 2022
Shell we play a game?{CTF-as-a-service} for security education
E Trickel, F Disperati, E Gustafson, F Kalantari, M Mabey, N Tiwari, ...
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
Andlantis: Large-scale Android dynamic analysis
M Bierma, E Gustafson, J Erickson, D Fritz, YR Choe
arXiv preprint arXiv:1410.7751, 2014
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
Quantifying the effects of removing permissions from android applications
K Kennedy, E Gustafson, H Chen
Workshop on Mobile Security Technologies (MoST), 2013
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Think outside the dataset: Finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
The World Wide Web Conference, 3108-3115, 2019
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization
S Ruoti, S Heidbrink, M O’Neill, E Gustafson, YR Choe
2017 IEEE International Conference on Web Services (ICWS), 862-865, 2017
Shall we play a game?
E Trickel, F Disperati, E Gustafson
CTF-as-a-service for Security Education USENIX Workshop on Advances in …, 2017
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ...
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
E Gustafson, P Grosen, N Redini, S Jha, A Continella, R Wang, K Fu, ...
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
Lightning talk-think outside the dataset: finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
Companion Proceedings of The 2019 World Wide Web Conference, 1288-1289, 2019
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
ED Gustafson
University of California, Santa Barbara, 2020
Towards automatically generating a sound and complete dataset for evaluating static analysis tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
Andlantis: Large-scale Android Dynamic Analysis.
YR Choe, M Bierma, JL Erickson, DJ Fritz, E Gustafson
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2014
The system can't perform the operation now. Try again later.
Articles 1–20