Adam Doupé
Arizona State University
H-index: 31
North America-United States
Top articles of Adam Doupé
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation | 33st USENIX Security Symposium (USENIX Security 24) | Zion Leonahenahe Basque Ati Priya Bajaj Wil Gibbs Jude O’Kain Derron Miao | 2024/8 |
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning | Kuntal Kumar Pal Ati Priya Bajaj Pratyay Banerjee Audrey Dutcher Mutsumi Nakamura | 2024/5 | |
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections | Kyle Zeng Zhenpeng Lin Kangjie Lu Xinyu Xing Ruoyu Wang | 2023/11/15 | |
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation | Hui Jun Tay Kyle Zeng Jayakrishna Menon Vadayath Arvind S Raj Audrey Dutcher | 2023 | |
Challenges in cybersecurity: Lessons from biological defense systems | Mathematical Biosciences | Edward Schrom Ann Kinzig Stephanie Forrest Andrea L Graham Simon A Levin | 2023/8/1 |
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer | Jaejong Baek Pradeep Kumar Duraisamy Soundrapandian Sukwha Kyung Ruoyu Wang Yan Shoshitaishvili | 2023/6/27 | |
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale | Marzieh Bitaab Haehyun Cho Adam Oest Zhuoer Lyu Wei Wang | 2023/5/21 | |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities | Erik Trickel Fabio Pagani Chang Zhu Lukas Dresel Giovanni Vigna | 2023/5/21 | |
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs | Jayakrishna Vadayath Moritz Eckert Kyle Zeng Nicolaas Weideman Gokulkrishna Praveen Menon | 2022 | |
Improving source-code representations to enhance search-based software repair | Pemma Reiter Antonio M Espinoza Adam Doupé Ruoyu Wang Westley Weimer | 2022/7/8 | |
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability | Kyle Zeng Yueqi Chen Haehyun Cho Xinyu Xing Adam Doupé | 2022 | |
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore | Sana Habib Tiffany Bao Yan Shoshitaishvili Adam Doupé | 2022/11/7 | |
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers | Ananta Soneji Faris Bugra Kokulu Carlos Rubio-Medrano Tiffany Bao Ruoyu Wang | 2022/5/22 | |
Unleash the simulacrum: shifting browser realities for robust {Extension-Fingerprinting} prevention | Soroush Karami Faezeh Kalantari Mehrnoosh Zaeifi Xavier J Maso Erik Trickel | 2022 | |
ViK: practical mitigation of temporal memory safety violations through object ID inspection | Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang | 2022/2/28 | |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang Zhibo Sun Sukwha Kyung Hans Walter Behrens Zion Leonahenahe Basque | 2022/11/7 | |
Automatically mitigating vulnerabilities in x86 binary programs via partially recompilable decompilation | arXiv preprint arXiv:2202.12336 | Pemma Reiter Hui Jun Tay Westley Weimer Adam Doupé Ruoyu Wang | 2022/2/24 |
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment | Decision and Game Theory for Security: 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings | Subbarao Kambhampati | 2023/3/12 |
Above and Beyond: Organizational Efforts to Complement US Digital Security Compliance Mandates. | Rock Stevens Faris Bugra Kokulu Adam Doupé Michelle L. Mazurek | 2022/4 | |
Context-auditor: Context-sensitive content injection mitigation | Faezeh Kalantari Mehrnoosh Zaeifi Tiffany Bao Ruoyu Wang Yan Shoshitaishvili | 2022/10/26 |