Archives
- Nov 08, 2024
- GoSonar to Appear in IEEE S&P 2025
- Sep 27, 2024
- Awarded DARPA Young Faculty Award
- May 09, 2024
- AI Psychiatry to Appear in USENIX'24
- Jul 21, 2023
- CheatFighter to Appear in RAID'23
- Feb 24, 2023
- A Practical Beginner's Guide to Intel Processor Trace
- Sep 23, 2022
- VulChecker Accepted to USENIX 2023
- Sep 02, 2022
- PUMM Accepted to USENIX 2023
- Aug 31, 2022
- Differentiating ARCUS (USENIX'21) and Bunkerbuster (CCS'21)
- Jun 03, 2022
- Update Regarding Halibut Bugs (CVE-2021-42612, CVE-2021-42613, CVE-2021-42614)
- Mar 13, 2022
- Faculty Position at The Ohio State University
- Oct 12, 2021
- Case Study: Security Analysis of Halibut
- Sep 06, 2021
- Bunkerbuster to Appear in CCS'21
- Aug 31, 2021
- MARSARA to Appear in CCS'21
- May 26, 2021
- "Modeling Large-Scale Manipulation in Open Stock Markets" to Appear in IEEE Security & Privacy
- Feb 08, 2021
- ARCUS System and Dataset Released
- Dec 12, 2020
- Vulnerability Root Cause Analysis Approach "ARCUS" to Appear in USENIX'21
- Oct 26, 2020
- "Justitia" Biometric Privacy to Appear in ASIACCS'21
- Oct 04, 2020
- "Bot2Stock" to Appear in ACSAC'20
- Jun 29, 2020
- New CVE Published (CVE-2020-14931)
- Jun 18, 2020
- H&R Block App Analytics for 2020
- Jun 18, 2020
- Fuzzers Suck: New 0-Day Shows We Need To Do Better
- Mar 02, 2020
- New CVE Published (CVE-2020-9549)
- Aug 15, 2019
- New PoC Published to Exploit-DB (EDB-ID-47254)
- Jun 22, 2019
- A Beginner's Guide to Hacking Video Game Save States (Fire Emblem 7 on the GBA)
- Jun 11, 2019
- MLSploit Extended Abstract to Appear in KDD 2019
- Jun 08, 2019
- Barnum Paper to Appear in Information Security Conference 2019 (ISC'19)
- Apr 26, 2019
- Extended Abstract to Appear in CVPR-19 Workshop on Explainable AI
- Apr 12, 2019
- H&R Block App Analytics for 2019
- Apr 06, 2019
- Android Intent Firewall Documentation
- Feb 21, 2019
- Malware Has a Color
- Jan 17, 2019
- Upcoming MLsploit Demo at Black Hat Asia 2019
- Dec 27, 2018
- Three Kinds of Document Malware and Designing Frameworks to Detect Them
- Sep 05, 2018
- Mention for Georgia Tech Vulnerability Disclosure
- Aug 14, 2018
- The Unfortunate Economics of Defense in Depth
- Jul 23, 2018
- Paper Accepted to ACM CCS 2018
- May 30, 2018
- Weird Things Are Afoot In The Honeypot
- May 14, 2018
- EFF and EFAIL: An Example of Hype Culture Gone Awry
- Feb 24, 2018
- Debian Apt Repo for libipt
- Feb 09, 2018
- H&R Block "MyBlock" App + USA Government Website Analytics = PROFIT
- Dec 16, 2017
- How ASLR Helps Enable Exploits (CVE-2013-2028)
- Oct 28, 2017
- Intel PT Data at Rest: A Compression Experiment
- Aug 29, 2017
- Windows _EX_FAST_REF Pointers and Virtual Machine Introspection
- Jul 28, 2017
- You never know where your code will end up.
- Mar 21, 2017
- Intel Processor Trace, execvp, and ptrace
- Mar 09, 2017
- Of Fancy Bears and Men: Attribution in Cybersecurity
- Jan 30, 2017
- Getting the CR3 value for a PID in Linux
- Jan 24, 2017
- Site Redesign
- Oct 22, 2016
- The Problem with DRM
- Apr 21, 2016
- Demystifying the Master’s Thesis — Is it right for you?
- Apr 01, 2016
- Apple’s Balancing Act—Yesterday, Today, and Tomorrow
- Feb 22, 2016
- Apple vs. the FBI
- Feb 22, 2016
- SU Senior Carter Yagemann’s Summer of Android
- Feb 04, 2016
- How Orange Helps You Sleep At Night
- Nov 30, 2015
- Understanding Dell’s Root Certificate Problem
- Nov 11, 2015
- Students Compete in RIT Cybersecurity Competition
- Nov 03, 2015
- Android for Your Laptop
- Oct 30, 2015
- Initial Observations Regarding Android Pay
- Oct 30, 2015
- How Number of Limbs Relates to Robots and Organisms
- Oct 30, 2015
- Installing Google Play Service and Google Apps on Nexus AOSP
- Oct 28, 2015
- Digital Verses Analog Sanitization
- Oct 24, 2015
- Is your data really gone? Explaining the challenges of data wiping.
- Oct 20, 2015
- The importance of boot partitions in Linux systems.
- Sep 18, 2015
- Using internet of things to turn on a computer.
- Feb 13, 2015
- Installing psad on Raspberry Pi Running Arch Linux