Maverick Woo
Shan Leung Maverick Woo
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c14]Virgil D. Gligor, Maverick Woo:
Requirements for Root of Trust Establishment. Security Protocols Workshop 2018: 192-202 - [i1]Valentin J. M. Manès, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, Maverick Woo:
Fuzzing: Art, Science, and Engineering. CoRR abs/1812.00140 (2018) - 2017
- [c13]Andrew Reynolds, Maverick Woo, Clark Barrett, David Brumley, Tianyi Liang, Cesare Tinelli:
Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification. CAV (2) 2017: 453-474 - 2016
- [c12]Daming D. Chen, Maverick Woo, David Brumley, Manuel Egele:
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. NDSS 2016 - 2015
- [j3]Ilker Nadi Bozkurt, Hai Huang, Bruce M. Maggs, Andréa W. Richa, Maverick Woo:
Mutual Embeddings. Journal of Interconnection Networks 15(1-2) (2015) - [c11]Sang Kil Cha, Maverick Woo, David Brumley:
Program-Adaptive Mutational Fuzzing. IEEE Symposium on Security and Privacy 2015: 725-741 - 2014
- [j2]Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. Commun. ACM 57(2): 74-84 (2014) - [c10]Manuel Egele, Maverick Woo, Peter Chapman, David Brumley:
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. USENIX Security Symposium 2014: 303-317 - [c9]Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley:
BYTEWEIGHT: Learning to Recognize Functions in Binary Code. USENIX Security Symposium 2014: 845-860 - 2013
- [c8]Maverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley:
Scheduling black-box mutational fuzzing. ACM Conference on Computer and Communications Security 2013: 511-522 - [c7]Jiyong Jang, Maverick Woo, David Brumley:
Towards Automatic Software Lineage Inference. USENIX Security Symposium 2013: 81-96 - [c6]David Brumley, JongHyup Lee, Edward J. Schwartz, Maverick Woo:
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. USENIX Security Symposium 2013: 353-368 - 2012
- [j1]Jiyong Jang, Maverick Woo, David Brumley:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions. ;login: 37(6) (2012)
2000 – 2009
- 2008
- [c5]Jonathan Derryberry, Don Sheehy, Maverick Woo, Danny Dominic Sleator:
Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors. CCCG 2008 - 2006
- [c4]Virginia Vassilevska, Ryan Williams, Shan Leung Maverick Woo:
Confronting hardness using a hybrid approach. SODA 2006: 1-10 - 2005
- [c3]Bruce M. Maggs, Gary L. Miller, Ojas Parekh, R. Ravi, Shan Leung Maverick Woo:
Finding effective support-tree preconditioners. SPAA 2005: 176-185 - 2004
- [c2]Umut A. Acar, Guy E. Blelloch, Robert Harper, Jorge L. Vittes, Shan Leung Maverick Woo:
Dynamizing static algorithms, with applications to dynamic trees and history independence. SODA 2004: 531-540 - 2003
- [c1]Guy E. Blelloch, Bruce M. Maggs, Shan Leung Maverick Woo:
Space-efficient finger search on degree-balanced search trees. SODA 2003: 374-383
Coauthor Index
last updated on 2019-01-09 01:17 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint