Aravind Machiry
Aravind Machiry
Assistant Professor, Purdue University
Verified email at - Homepage
Cited by
Cited by
Dynodroid: An input generation system for android apps
A Machiry, R Tahiliani, M Naik
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
Difuze: Interface aware fuzzing for kernel drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Ramblr: Making Reassembly Great Again.
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
NDSS, 2017
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
A Machiry, C Spensky, J Corina, N Stephens, C Kruegel, G Vigna
USENIX Security Symposium, 1007-1024, 2017
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
A Machiry, E Gustafson, C Spensky, C Salls, N Stephens, R Wang, ...
NDSS, 2017
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Detecting deceptive reviews using generative adversarial networks
H Aghakhani, A Machiry, S Nilizadeh, C Kruegel, G Vigna
2018 IEEE Security and Privacy Workshops (SPW), 89-95, 2018
BootStomp: On the Security of Bootloaders in Mobile Devices.
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
USENIX Security Symposium, 781-798, 2017
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 431-448, 2020
Clapp: Characterizing loops in android applications
Y Fratantonio, A Machiry, A Bianchi, C Kruegel, G Vigna
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
Broken Fingers: On the Usage of the Fingerprint API in Android.
A Bianchi, Y Fratantonio, A Machiry, C Kruegel, G Vigna, SPH Chung, ...
NDSS, 2018
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021
SPIDER: Enabling Fast Patch Propagation in Related Software Repositories
A Machiry, N Redini, E Camellini, C Kruegel, G Vigna
2020 IEEE Symposium on Security and Privacy (SP), 512-529, 2020
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
Exploring abstraction functions in fuzzing
C Salls, A Machiry, A Doupe, Y Shoshitaishvili, C Kruegel, G Vigna
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Arbitrar: User-guided api misuse detection
Z Li, A Machiry, B Chen, M Naik, K Wang, L Song
2021 IEEE Symposium on Security and Privacy (SP), 1400-1415, 2021
C to Checked C by 3C
A Machiry, J Kastner, M McCutchen, A Eline, K Headley, M Hicks
Proceedings of the ACM on Programming Languages 6 (OOPSLA1), 1-29, 2022
The system can't perform the operation now. Try again later.
Articles 1–20