More
- Adam Oest
- Andrea Continella
- Daniel Alexander Zappala
- Daniel Votipka
- Davide Balzarotti
- Frederico Araujo
- Gianluca Stringhini
- Kurt Thomas
- Manuel Egele
- Sara Rampazzi
- Shirin Nilizadeh
- Thorsten Holz
- Xiapu Luo
- Yanick Fratantonio
R2 Accept Conditional on Major Revision -> Accept
Final version (536kB) Jun 14, 2023, 12:12:17 PM PDT e688675a01bae05a03fa9b502c3e91c7d8ca85dff64cc241b94414d25f9fd194e688675a
H. Tay, K. Zeng, J. Vadayath, A. Raj, A. Dutcher, T. Reddy, W. Gibbs, Z. Basque, F. Dong, Z. Smith, A. Doupé, T. Bao, Y. Shoshitaishvili, R. Wang
- Hui Jun Tay (Arizona State University) <htay2@asu.edu>
- Kyle Zeng (Arizona State University) <zengyhkyle@asu.edu>
- Jayakrishna Menon Vadayath (Arizona State University) <jvadayat@asu.edu>
- Arvind S Raj (Arizona State University) <arvindsraj@asu.edu>
- Audrey Dutcher (Arizona State University) <dutcher@asu.edu>
- Tejesh Reddy (Arizona State University) <vsiginen@asu.edu>
- Wil Gibbs (Arizona State University) <wfgibbs@asu.edu>
- Zion Leonahenahe Basque (Arizona State University) <zbasque@asu.edu>
- Fangzhou Dong (Arizona State University) <fdong12@asu.edu>
- Zack Smith (Arizona State University)
- Adam Doupé (Arizona State University) <doupe@asu.edu>
- Tiffany Bao (Arizona State University) <tbao@asu.edu>
- Yan Shoshitaishvili (Arizona State University) <yans@asu.edu>
- Ruoyu Wang (Arizona State University) <fishw@asu.edu>
✓ Ethics Consideration
✓ Internet Defense Prize
✓ Distinguished Paper Award
✓ Artifact Evaluation
- Hardware security: Embedded systems security
- Security analysis: Automated security analysis of source code and binaries
To edit this submission, sign in using your email and password.