Follow
Eric Gustafson
Eric Gustafson
Verified email at cs.ucsb.edu - Homepage
Title
Cited by
Cited by
Year
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
1452020
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1272019
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
1232017
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
662017
Andlantis: Large-scale Android dynamic analysis
M Bierma, E Gustafson, J Erickson, D Fritz, YR Choe
arXiv preprint arXiv:1410.7751, 2014
642014
Shell We Play A Game?{CTF-as-a-service} for Security Education
E Trickel, F Disperati, E Gustafson, F Kalantari, M Mabey, N Tiwari, ...
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
562017
Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing
T Scharnowski, N Bars, M Schloegel, E Gustafson, M Muench, G Vigna, ...
31st USENIX Security Symposium (USENIX Security 22), 1239-1256, 2022
452022
Exploitation and mitigation of authentication schemes based on device-public information
A Bianchi, E Gustafson, Y Fratantonio, C Kruegel, G Vigna
Proceedings of the 33rd Annual Computer Security Applications Conference, 16-27, 2017
262017
Quantifying the effects of removing permissions from android applications
K Kennedy, E Gustafson, H Chen
Workshop on Mobile Security Technologies (MoST), 2013
262013
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
242018
Think outside the dataset: Finding fraudulent reviews using cross-dataset analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
The World Wide Web Conference, 3108-3115, 2019
212019
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
172020
Intrusion detection with unsupervised heterogeneous ensembles using cluster-based normalization
S Ruoti, S Heidbrink, M O’Neill, E Gustafson, YR Choe
2017 IEEE International Conference on Web Services (ICWS), 862-865, 2017
82017
Shall we play a game?
E Trickel, F Disperati, E Gustafson
CTF-as-a-service for Security Education USENIX Workshop on Advances in …, 2017
72017
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
E Gustafson, P Grosen, N Redini, S Jha, A Continella, R Wang, K Fu, ...
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
32023
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
D Quarta, M Ianni, A Machiry, Y Fratantonio, E Gustafson, D Balzarotti, ...
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
32021
Lightning Talk-Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis
S Nilizadeh, H Aghakhani, E Gustafson, C Kruegel, G Vigna
Companion Proceedings of The 2019 World Wide Web Conference, 1288-1289, 2019
32019
Towards automatically generating a sound and complete dataset for evaluating static analysis tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
32019
Andlantis: Large-scale Android Dynamic Analysis.
YR Choe, M Bierma, JL Erickson, DJ Fritz, E Gustafson
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2014
22014
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
ED Gustafson
UC Santa Barbara, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20