Media Summary: DeepReflect: Discovering Malicious Functionality through Binary Reconstruction Evan Downing, Georgia Institute of Technology; ... The Circle Of Life: A Large-Scale Study of The IoT Michelle Y. Wong University of Toronto Abstract:

Usenix Security 21 Obfuscation Resilient Executable Payload Extraction From Packed Malware - Detailed Analysis & Overview

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction Evan Downing, Georgia Institute of Technology; ... The Circle Of Life: A Large-Scale Study of The IoT Michelle Y. Wong University of Toronto Abstract: WebWitness: Investigating, Categorizing, and Mitigating

Photo Gallery

USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware
USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior
USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
USENIX Security '21 - YARIX: Scalable YARA-based Malware Intelligence
USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images
USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
USENIX Security '22 - Loki: Hardening Code Obfuscation Against Automated Attacks
USENIX Security '21 - MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks
USENIX Security '21 - Cost-Aware Robust Tree Ensembles for Security Applications
View Detailed Profile
USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware

USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware

Obfuscation

USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior

USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior

When

USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction

USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction

DeepReflect: Discovering Malicious Functionality through Binary Reconstruction Evan Downing, Georgia Institute of Technology; ...

USENIX Security '21 - YARIX: Scalable YARA-based Malware Intelligence

USENIX Security '21 - YARIX: Scalable YARA-based Malware Intelligence

YARIX: Scalable YARA-based

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images

Forecasting

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

USENIX Security

USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle

USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle

The Circle Of Life: A Large-Scale Study of The IoT

USENIX Security '22 - Loki: Hardening Code Obfuscation Against Automated Attacks

USENIX Security '22 - Loki: Hardening Code Obfuscation Against Automated Attacks

USENIX Security

USENIX Security '21 - MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation

USENIX Security '21 - MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation

USENIX Security

USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks

USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks

USENIX Security

USENIX Security '21 - Cost-Aware Robust Tree Ensembles for Security Applications

USENIX Security '21 - Cost-Aware Robust Tree Ensembles for Security Applications

USENIX Security

USENIX Security '23 - On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

USENIX Security '23 - On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

USENIX Security

USENIX Security '20 - On Training Robust PDF Malware Classifiers

USENIX Security '20 - On Training Robust PDF Malware Classifiers

On Training Robust PDF

USENIX Security '21 - FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for

USENIX Security '21 - FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for

USENIX Security

USENIX Security '21 - Risky Business? Investigating the Security Practices of Vendors on an Online

USENIX Security '21 - Risky Business? Investigating the Security Practices of Vendors on an Online

Risky Business? Investigating the

USENIX Security '18 - Tackling runtime-based obfuscation in Android with TIRO

USENIX Security '18 - Tackling runtime-based obfuscation in Android with TIRO

Michelle Y. Wong University of Toronto Abstract:

USENIX Security '15 - WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths

USENIX Security '15 - WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths

WebWitness: Investigating, Categorizing, and Mitigating

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security