Подписаться
Sergey Bratus
Sergey Bratus
Подтвержден адрес электронной почты в домене dartmouth.edu
Название
Процитировано
Процитировано
Год
Active behavioral fingerprinting of wireless devices
S Bratus, C Cornelius, D Kotz, D Peebles
Proceedings of the first ACM conference on Wireless network security, 56-61, 2008
1612008
On the reliability of wireless fingerprinting using clock skews
C Arackaparambil, S Bratus, A Shubina, D Kotz
Proceedings of the third ACM conference on Wireless network security, 169-174, 2010
1252010
Automated mapping of large binary objects using primitive fragment type classification
G Conti, S Bratus, A Shubina, B Sangster, R Ragsdale, M Supan, ...
digital investigation 7, S3-S12, 2010
1172010
Exploit programming: From buffer overflows to weird machines and theory of computation
S Bratus, ME Locasto, ML Patterson, L Sassaman, A Shubina
USENIX; login 36 (6), 13-21, 2011
1032011
TOCTOU, traps, and trusted computing
S Bratus, N D’Cunha, E Sparks, SW Smith
International Conference on Trusted Computing, 14-32, 2008
1022008
Security applications of formal language theory
L Sassaman, ML Patterson, S Bratus, ME Locasto
IEEE Systems Journal 7 (3), 489-500, 2013
892013
What hackers learn that the rest of us don't: Notes on hacker curriculum
S Bratus
IEEE Security & Privacy 5 (4), 72-75, 2007
722007
A visual study of primitive binary fragment types
G Conti, S Bratus, A Shubina, A Lichtenberg, R Ragsdale, ...
White Paper, Black Hat USA, 2010
572010
The seven turrets of babel: A taxonomy of langsec errors and how to expunge them
F Momot, S Bratus, SM Hallberg, ML Patterson
2016 IEEE Cybersecurity Development (SecDev), 45-52, 2016
562016
Packets in Packets: Orson Welles'{In-Band} Signaling Attacks for Modern Radios
T Goodspeed, S Bratus, R Melgares, R Shapiro, R Speers
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
522011
Teaching the principles of the hacker curriculum to undergraduates
S Bratus, A Shubina, ME Locasto
Proceedings of the 41st ACM technical symposium on computer science …, 2010
492010
Intrusion detection for resource-constrained embedded control systems in the power grid
J Reeves, A Ramaswamy, M Locasto, S Bratus, S Smith
International Journal of Critical Infrastructure Protection 5 (2), 74-83, 2012
472012
The halting problems of network stack insecurity
L Sassaman, ML Patterson, S Bratus, A Shubina
USENIX; login 36 (6), 22-32, 2011
452011
Fast Constructive Recognition of a Black Box Group Isomorphic toSnorAnusing Goldbach’s Conjecture
S Bratus, I Pak
Journal of Symbolic Computation 29 (1), 33-57, 2000
452000
The {Page-Fault} Weird Machine: Lessons in Instruction-less Computation
J Bangert, S Bratus, R Shapiro, SW Smith
7th USENIX Workshop on Offensive Technologies (WOOT 13), 2013
442013
Identifying vulnerabilities in SCADA systems via fuzz-testing
R Shapiro, S Bratus, E Rogers, S Smith
International Conference on Critical Infrastructure Protection, 57-72, 2011
442011
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.
J Oakley, S Bratus
WOOT 10, 2028052.2028063, 2011
402011
Katana: A hot patching framework for elf executables
A Ramaswamy, S Bratus, SW Smith, ME Locasto
2010 International Conference on Availability, Reliability and Security, 507-512, 2010
392010
LZfuzz: a fast compression-based fuzzer for poorly documented protocols
S Bratus, A Hansen, A Shubina
382008
Weird machines
R Shapiro, S Bratus, SW Smith
ELF: A spotlight on the underappreciated metadata. In Proceedings of the 7th …, 2013
362013
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20