Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sam L. Thomas
@inproceedings{DBLP:conf/ccs/ChenTG22, author = {Zitai Chen and Sam L. Thomas and Flavio D. Garcia}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {515--529}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559338}, doi = {10.1145/3548606.3559338}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StoneTVHBC22, author = {Chris McMahon Stone and Sam L. Thomas and Mathy Vanhoef and James Henderson and Nicolas Bailluet and Tom Chothia}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {The Closer You Look, The More You Learn: {A} Grey-box Approach to Protocol State Machine Learning}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2265--2278}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559365}, doi = {10.1145/3548606.3559365}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StoneTVHBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03528, author = {Zitai Chen and Sam L. Thomas and Flavio D. Garcia}, title = {MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware}, journal = {CoRR}, volume = {abs/2208.03528}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03528}, doi = {10.48550/ARXIV.2208.03528}, eprinttype = {arXiv}, eprint = {2208.03528}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ThomasHVCOG21, author = {Sam L. Thomas and Jan Van den Herrewegen and Georgios Vasilakis and Zitai Chen and Mihai Ordean and Flavio D. Garcia}, title = {Cutting Through the Complexity of Reverse Engineering Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {360--389}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.360-389}, doi = {10.46586/TCHES.V2021.I3.360-389}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ThomasHVCOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/FrancillonTC21, author = {Aur{\'{e}}lien Francillon and Sam L. Thomas and Andrei Costin}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {Finding Software Bugs in Embedded Devices}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {183--197}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_11}, doi = {10.1007/978-3-030-10591-4\_11}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/21/FrancillonTC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-02623, author = {Chris McMahon Stone and Sam L. Thomas and Mathy Vanhoef and James Henderson and Nicolas Bailluet and Tom Chothia}, title = {The Closer You Look, The More You Learn: {A} Grey-box Approach to Protocol State Machine Learning}, journal = {CoRR}, volume = {abs/2106.02623}, year = {2021}, url = {https://arxiv.org/abs/2106.02623}, eprinttype = {arXiv}, eprint = {2106.02623}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-02623.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Thomas18, author = {Sam L. Thomas}, title = {Backdoor detection systems for embedded devices}, school = {University of Birmingham, {UK}}, year = {2018}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.753100}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Thomas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ThomasF18, author = {Sam L. Thomas and Aur{\'{e}}lien Francillon}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Backdoors: Definition, Deniability and Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {92--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_5}, doi = {10.1007/978-3-030-00470-5\_5}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/ThomasF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ThomasGC17, author = {Sam L. Thomas and Flavio D. Garcia and Tom Chothia}, editor = {Michalis Polychronakis and Michael Meier}, title = {HumIDIFy: {A} Tool for Hidden Functionality Detection in Firmware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {279--300}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_13}, doi = {10.1007/978-3-319-60876-1\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ThomasGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ThomasCG17, author = {Sam L. Thomas and Tom Chothia and Flavio D. Garcia}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {513--531}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_28}, doi = {10.1007/978-3-319-66399-9\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ThomasCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.