William Robertson
North Eastern University
H-index: 43
Asia-Thailand
Top articles of William Robertson
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Black-box Attacks Against Neural Binary Function Detection | Joshua Bundt Michael Davinroy Ioannis Agadakos Alina Oprea William Robertson | 2023/10/16 | |
ThreadLock: Native Principal Isolation Through Memory Protection Keys | William Blair William Robertson Manuel Egele | 2023/7/10 | |
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis | Joshua Bundt Andrew Fasano Brendan Dolan-Gavitt William Robertson Tim Leek | 2023/4/16 | |
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys | William Blair William Robertson Manuel Egele | 2022/6/24 | |
Polytope: Practical memory access control for C++ applications | arXiv preprint arXiv:2201.08461 | Ioannis Agadakos Manuel Egele William Robertson | 2022/1/20 |
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing | ACM Transactions on Privacy and Security | William Blair Andrea Mambretti Sajjad Arshad Michael Weissbacher William Robertson | 2022/7/9 |
Sok: Enabling security analyses of embedded systems via rehosting | Andrew Fasano Tiemoko Ballo Marius Muench Tim Leek Alexander Bulekov | 2021/5/24 | |
DICE: Automatic emulation of DMA input channels for dynamic firmware analysis | Alejandro Mera Bo Feng Long Lu Engin Kirda | 2021/5/24 | |
Bypassing memory safety mechanisms through speculative control flow hijacks | Andrea Mambretti Alexandra Sandulescu Alessandro Sorniotti William Robertson Engin Kirda | 2021/9/6 | |
PyPANDA: taming the pandamonium of whole system dynamic analysis | NDSS Binary Analysis Research Workshop | Luke Craig Andrew Fasano Tiemoko Ballo Tim Leek Brendan Dolan-Gavitt | 2021/6 |
Evaluating synthetic bugs | Joshua Bundt Andrew Fasano Brendan Dolan-Gavitt William Robertson Tim Leek | 2021/5/24 | |
HotFuzz: Discovering algorithmic denial-of-service vulnerabilities through guided micro-fuzzing | arXiv preprint arXiv:2002.03416 | William Blair Andrea Mambretti Sajjad Arshad Michael Weissbacher William Robertson | 2020/2/9 |
What's in an Exploit? An Empirical Analysis of Reflected Server {XSS} Exploitation Techniques | Ahmet Salih Buyukkayhan Can Gemicioglu Tobias Lauinger Alina Oprea William Robertson | 2020 | |
Cached and confused: Web cache deception in the wild | Seyed Ali Mirheidari Sajjad Arshad Kaan Onarlioglu Bruno Crispo Engin Kirda | 2020 |