Tiffany Bao
Arizona State University
H-index: 14
North America-United States
Top articles of Tiffany Bao
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation | 33st USENIX Security Symposium (USENIX Security 24) | Zion Leonahenahe Basque Ati Priya Bajaj Wil Gibbs Jude O’Kain Derron Miao | 2024/8 |
Airtaint: Making dynamic taint analysis faster and easier | Qian Sang Yanhao Wang Yuwei Liu Xiangkun Jia Tiffany Bao | 2023/10/17 | |
{AutoFR}: Automated Filter Rule Generation for Adblocking | Hieu Le Jamie Hayes Salma Elmalaki Milad Nasr Athina Markopoulou | 2023 | |
Systems and methods for predicting development of functional vulnerability exploits | 2023/8/17 | ||
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation | Hui Jun Tay Kyle Zeng Jayakrishna Menon Vadayath Arvind S Raj Audrey Dutcher | 2023 | |
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale | Marzieh Bitaab Haehyun Cho Adam Oest Zhuoer Lyu Wei Wang | 2023/5/21 | |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities | Erik Trickel Fabio Pagani Chang Zhu Lukas Dresel Giovanni Vigna | 2023/5/21 | |
Exploring the Limits of ChatGPT in Software Security Applications | arXiv preprint arXiv:2312.05275 | Fangzhou Wu Qingzhao Zhang Ati Priya Bajaj Tiffany Bao Ning Zhang | 2023/12/8 |
Cyber Deception: Techniques, Strategies, and Human Aspects | Tiffany Bao Milind Tambe Cliff Wang | 2023/3/8 | |
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections | Kyle Zeng Zhenpeng Lin Kangjie Lu Xinyu Xing Ruoyu Wang | 2023/11/15 | |
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers | Ananta Soneji Faris Bugra Kokulu Carlos Rubio-Medrano Tiffany Bao Ruoyu Wang | 2022/5/22 | |
ViK: practical mitigation of temporal memory safety violations through object ID inspection | Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang | 2022/2/28 | |
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs | Jayakrishna Vadayath Moritz Eckert Kyle Zeng Nicolaas Weideman Gokulkrishna Praveen Menon | 2022 | |
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore | Sana Habib Tiffany Bao Yan Shoshitaishvili Adam Doupé | 2022/11/7 | |
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability | Kyle Zeng Yueqi Chen Haehyun Cho Xinyu Xing Adam Doupé | 2022 | |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang Zhibo Sun Sukwha Kyung Hans Walter Behrens Zion Leonahenahe Basque | 2022/11/7 | |
Expected exploitability: Predicting the development of functional vulnerability exploits | Octavian Suciu Connor Nelson Zhuoer Lyu Tiffany Bao Tudor Dumitraș | 2022 | |
Context-auditor: Context-sensitive content injection mitigation | Faezeh Kalantari Mehrnoosh Zaeifi Tiffany Bao Ruoyu Wang Yan Shoshitaishvili | 2022/10/26 | |
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing | Penghui Zhang Adam Oest Haehyun Cho Zhibo Sun RC Johnson | 2021/5/24 | |
SyML: Guiding symbolic execution toward vulnerable states through pattern learning | Nicola Ruaro Kyle Zeng Lukas Dresel Mario Polino Tiffany Bao | 2021/10/6 |