default search action
Brendan Saltaformaggio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Mingxuan Yao, Runze Zhang, Haichuan Xu, Shih-Huan Chou, Varun Chowdhary Paturi, Amit Kumar Sikder, Brendan Saltaformaggio:
Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud. SP 2024: 2236-2254 - [c32]David Oygenblik, Carter Yagemann, Joseph Zhang, Arianna Mastali, Jeman Park, Brendan Saltaformaggio:
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images. USENIX Security Symposium 2024 - [c31]Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, Brendan Saltaformaggio:
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware. USENIX Security Symposium 2024 - 2023
- [c30]Mingxuan Yao, Jonathan Fuller, Ranjita Pai Sridhar, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio:
Invited Tutorial: Counteracting Web Application Abuse in Malware. SecDev 2023: 1-2 - [c29]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning. USENIX Security Symposium 2023: 823-840 - [c28]Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio:
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware. USENIX Security Symposium 2023: 6115-6132 - 2022
- [j5]Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah:
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(5): 3218-3230 (2022) - [c27]Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio:
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces. USENIX Security Symposium 2022: 161-178 - 2021
- [j4]Carter Yagemann, Simon Pak Ho Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. IEEE Secur. Priv. 19(6): 58-65 (2021) - [c26]Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee:
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis. CCS 2021: 320-336 - [c25]Jonathan Fuller, Ranjita Pai Kasturi, Amit Kumar Sikder, Haichuan Xu, Berat Arik, Vivek Verma, Ehsan Asdar, Brendan Saltaformaggio:
C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration. CCS 2021: 3352-3365 - [c24]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. NDSS 2021 - [c23]Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee:
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. USENIX Security Symposium 2021: 1989-2006 - [c22]Omar Alrawi, Moses Ike, Matthew Pruett, Ranjita Pai Kasturi, Srimanta Barua, Taleb Hirani, Brennan Hill, Brendan Saltaformaggio:
Forecasting Malware Capabilities From Cyber Attack Memory Images. USENIX Security Symposium 2021: 3523-3540 - 2020
- [c21]Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
On the Feasibility of Automating Stock Market Manipulation. ACSAC 2020: 277-290 - [c20]Ranjita Pai Kasturi, Yiting Sun, Ruian Duan, Omar Alrawi, Ehsan Asdar, Victor Zhu, Yonghwi Kwon, Brendan Saltaformaggio:
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks. SP 2020: 1156-1171 - [i1]Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Measuring and Preventing Supply Chain Attacks on Package Managers. CoRR abs/2002.01139 (2020)
2010 – 2019
- 2019
- [c19]Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee:
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. NDSS 2019 - [c18]Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. USENIX Security Symposium 2019: 551-566 - 2018
- [j3]Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73: 235-248 (2018) - [j2]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. Comput. Secur. 77: 737-744 (2018) - [c17]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - 2017
- [j1]Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Rohit Bhatia, Brendan Saltaformaggio, Dongyan Xu:
Live acquisition of main memory data from Android smartphones and smartwatches. Digit. Investig. 23: 50-62 (2017) - [c16]Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - [c15]Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
Self Destructing Exploit Executions via Input Perturbation. NDSS 2017 - 2016
- [b1]Brendan Saltaformaggio:
Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. Purdue University, USA, 2016 - [c14]Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. ACSAC 2016: 583-595 - [c13]Yonghwi Kwon, Dohyeong Kim, William N. Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
LDX: Causality Inference by Lightweight Dual Execution. ASPLOS 2016: 503-515 - [c12]Hui Lu, Brendan Saltaformaggio, Cong Xu, Umesh Bellur, Dongyan Xu:
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack. SoCC 2016: 169-181 - [c11]Hui Lu, Abhinav Srivastava, Brendan Saltaformaggio, Dongyan Xu:
StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services. DSN 2016: 73-84 - [c10]Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. USENIX Security Symposium 2016: 1137-1151 - [c9]Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian:
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. WOOT 2016 - 2015
- [c8]Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
iRiS: Vetting Private API Abuse in iOS Applications. CCS 2015: 44-56 - [c7]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
GUITAR: Piecing Together Android App GUIs from Memory Images. CCS 2015: 120-132 - [c6]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. CCS 2015: 146-157 - [c5]Hui Lu, Brendan Saltaformaggio, Ramana Rao Kompella, Dongyan Xu:
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation. SoCC 2015: 125-138 - [c4]Cong Xu, Brendan Saltaformaggio, Sahan Gamage, Ramana Rao Kompella, Dongyan Xu:
vRead: Efficient Data Access for Hadoop in Virtualized Clouds. Middleware 2015: 125-136 - 2014
- [c3]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. DSN 2014: 491-502 - [c2]Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. USENIX Security Symposium 2014: 255-269 - 2011
- [c1]Daniel Bilar, Brendan Saltaformaggio:
Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants. CyCon 2011: 1-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint