Tiffany Bao

Tiffany Bao

Arizona State University

H-index: 14

North America-United States

About Tiffany Bao

Tiffany Bao, With an exceptional h-index of 14 and a recent h-index of 14 (since 2020), a distinguished researcher at Arizona State University,

His recent articles reflect a diverse array of research interests and contributions to the field:

Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation

Airtaint: Making dynamic taint analysis faster and easier

{AutoFR}: Automated Filter Rule Generation for Adblocking

Systems and methods for predicting development of functional vulnerability exploits

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

Exploring the Limits of ChatGPT in Software Security Applications

Tiffany Bao Information

University

Position

___

Citations(all)

986

Citations(since 2020)

855

Cited By

288

hIndex(all)

14

hIndex(since 2020)

14

i10Index(all)

17

i10Index(since 2020)

17

Email

University Profile Page

Arizona State University

Google Scholar

View Google Scholar Profile

Top articles of Tiffany Bao

Title

Journal

Author(s)

Publication Date

Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation

33st USENIX Security Symposium (USENIX Security 24)

Zion Leonahenahe Basque

Ati Priya Bajaj

Wil Gibbs

Jude O’Kain

Derron Miao

...

2024/8

Airtaint: Making dynamic taint analysis faster and easier

Qian Sang

Yanhao Wang

Yuwei Liu

Xiangkun Jia

Tiffany Bao

...

2023/10/17

{AutoFR}: Automated Filter Rule Generation for Adblocking

Hieu Le

Jamie Hayes

Salma Elmalaki

Milad Nasr

Athina Markopoulou

...

2023

Systems and methods for predicting development of functional vulnerability exploits

2023/8/17

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

Hui Jun Tay

Kyle Zeng

Jayakrishna Menon Vadayath

Arvind S Raj

Audrey Dutcher

...

2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale

Marzieh Bitaab

Haehyun Cho

Adam Oest

Zhuoer Lyu

Wei Wang

...

2023/5/21

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

Erik Trickel

Fabio Pagani

Chang Zhu

Lukas Dresel

Giovanni Vigna

...

2023/5/21

Exploring the Limits of ChatGPT in Software Security Applications

arXiv preprint arXiv:2312.05275

Fangzhou Wu

Qingzhao Zhang

Ati Priya Bajaj

Tiffany Bao

Ning Zhang

...

2023/12/8

Cyber Deception: Techniques, Strategies, and Human Aspects

Tiffany Bao

Milind Tambe

Cliff Wang

2023/3/8

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections

Kyle Zeng

Zhenpeng Lin

Kangjie Lu

Xinyu Xing

Ruoyu Wang

...

2023/11/15

“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers

Ananta Soneji

Faris Bugra Kokulu

Carlos Rubio-Medrano

Tiffany Bao

Ruoyu Wang

...

2022/5/22

ViK: practical mitigation of temporal memory safety violations through object ID inspection

Haehyun Cho

Jinbum Park

Adam Oest

Tiffany Bao

Ruoyu Wang

...

2022/2/28

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

Jayakrishna Vadayath

Moritz Eckert

Kyle Zeng

Nicolaas Weideman

Gokulkrishna Praveen Menon

...

2022

Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore

Sana Habib

Tiffany Bao

Yan Shoshitaishvili

Adam Doupé

2022/11/7

Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability

Kyle Zeng

Yueqi Chen

Haehyun Cho

Xinyu Xing

Adam Doupé

...

2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior

Penghui Zhang

Zhibo Sun

Sukwha Kyung

Hans Walter Behrens

Zion Leonahenahe Basque

...

2022/11/7

Expected exploitability: Predicting the development of functional vulnerability exploits

Octavian Suciu

Connor Nelson

Zhuoer Lyu

Tiffany Bao

Tudor Dumitraș

2022

Context-auditor: Context-sensitive content injection mitigation

Faezeh Kalantari

Mehrnoosh Zaeifi

Tiffany Bao

Ruoyu Wang

Yan Shoshitaishvili

...

2022/10/26

CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing

Penghui Zhang

Adam Oest

Haehyun Cho

Zhibo Sun

RC Johnson

...

2021/5/24

SyML: Guiding symbolic execution toward vulnerable states through pattern learning

Nicola Ruaro

Kyle Zeng

Lukas Dresel

Mario Polino

Tiffany Bao

...

2021/10/6

See List of Professors in Tiffany Bao University(Arizona State University)

Co-Authors

H-index: 115
Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

H-index: 65
Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

H-index: 43
David Brumley

David Brumley

Carnegie Mellon University

H-index: 41
Dinghao Wu

Dinghao Wu

Penn State University

H-index: 31
Adam Doupé

Adam Doupé

Arizona State University

H-index: 28
Yan Shoshitaishvili

Yan Shoshitaishvili

Arizona State University

academic-engine