Carter Yagemann

Assistant Professor of Computer Science and Engineering at the Ohio State University with interests in automated vulnerability discovery, root cause analysis, exploit prevention, and cyber-physical security.

Archives


Nov 08, 2024
GoSonar to Appear in IEEE S&P 2025
Sep 27, 2024
Awarded DARPA Young Faculty Award
May 09, 2024
AI Psychiatry to Appear in USENIX'24
Jul 21, 2023
CheatFighter to Appear in RAID'23
Feb 24, 2023
A Practical Beginner's Guide to Intel Processor Trace
Sep 23, 2022
VulChecker Accepted to USENIX 2023
Sep 02, 2022
PUMM Accepted to USENIX 2023
Aug 31, 2022
Differentiating ARCUS (USENIX'21) and Bunkerbuster (CCS'21)
Jun 03, 2022
Update Regarding Halibut Bugs (CVE-2021-42612, CVE-2021-42613, CVE-2021-42614)
Mar 13, 2022
Faculty Position at The Ohio State University
Oct 12, 2021
Case Study: Security Analysis of Halibut
Sep 06, 2021
Bunkerbuster to Appear in CCS'21
Aug 31, 2021
MARSARA to Appear in CCS'21
May 26, 2021
"Modeling Large-Scale Manipulation in Open Stock Markets" to Appear in IEEE Security & Privacy
Feb 08, 2021
ARCUS System and Dataset Released
Dec 12, 2020
Vulnerability Root Cause Analysis Approach "ARCUS" to Appear in USENIX'21
Oct 26, 2020
"Justitia" Biometric Privacy to Appear in ASIACCS'21
Oct 04, 2020
"Bot2Stock" to Appear in ACSAC'20
Jun 29, 2020
New CVE Published (CVE-2020-14931)
Jun 18, 2020
H&R Block App Analytics for 2020
Jun 18, 2020
Fuzzers Suck: New 0-Day Shows We Need To Do Better
Mar 02, 2020
New CVE Published (CVE-2020-9549)
Aug 15, 2019
New PoC Published to Exploit-DB (EDB-ID-47254)
Jun 22, 2019
A Beginner's Guide to Hacking Video Game Save States (Fire Emblem 7 on the GBA)
Jun 11, 2019
MLSploit Extended Abstract to Appear in KDD 2019
Jun 08, 2019
Barnum Paper to Appear in Information Security Conference 2019 (ISC'19)
Apr 26, 2019
Extended Abstract to Appear in CVPR-19 Workshop on Explainable AI
Apr 12, 2019
H&R Block App Analytics for 2019
Apr 06, 2019
Android Intent Firewall Documentation
Feb 21, 2019
Malware Has a Color
Jan 17, 2019
Upcoming MLsploit Demo at Black Hat Asia 2019
Dec 27, 2018
Three Kinds of Document Malware and Designing Frameworks to Detect Them
Sep 05, 2018
Mention for Georgia Tech Vulnerability Disclosure
Aug 14, 2018
The Unfortunate Economics of Defense in Depth
Jul 23, 2018
Paper Accepted to ACM CCS 2018
May 30, 2018
Weird Things Are Afoot In The Honeypot
May 14, 2018
EFF and EFAIL: An Example of Hype Culture Gone Awry
Feb 24, 2018
Debian Apt Repo for libipt
Feb 09, 2018
H&R Block "MyBlock" App + USA Government Website Analytics = PROFIT
Dec 16, 2017
How ASLR Helps Enable Exploits (CVE-2013-2028)
Oct 28, 2017
Intel PT Data at Rest: A Compression Experiment
Aug 29, 2017
Windows _EX_FAST_REF Pointers and Virtual Machine Introspection
Jul 28, 2017
You never know where your code will end up.
Mar 21, 2017
Intel Processor Trace, execvp, and ptrace
Mar 09, 2017
Of Fancy Bears and Men: Attribution in Cybersecurity
Jan 30, 2017
Getting the CR3 value for a PID in Linux
Jan 24, 2017
Site Redesign
Oct 22, 2016
The Problem with DRM
Apr 21, 2016
Demystifying the Master’s Thesis — Is it right for you?
Apr 01, 2016
Apple’s Balancing Act—Yesterday, Today, and Tomorrow
Feb 22, 2016
Apple vs. the FBI
Feb 22, 2016
SU Senior Carter Yagemann’s Summer of Android
Feb 04, 2016
How Orange Helps You Sleep At Night
Nov 30, 2015
Understanding Dell’s Root Certificate Problem
Nov 11, 2015
Students Compete in RIT Cybersecurity Competition
Nov 03, 2015
Android for Your Laptop
Oct 30, 2015
Initial Observations Regarding Android Pay
Oct 30, 2015
How Number of Limbs Relates to Robots and Organisms
Oct 30, 2015
Installing Google Play Service and Google Apps on Nexus AOSP
Oct 28, 2015
Digital Verses Analog Sanitization
Oct 24, 2015
Is your data really gone? Explaining the challenges of data wiping.
Oct 20, 2015
The importance of boot partitions in Linux systems.
Sep 18, 2015
Using internet of things to turn on a computer.
Feb 13, 2015
Installing psad on Raspberry Pi Running Arch Linux