Coverage maximization using dynamic taint tracing T Leek, G Baker, R Brown, M Zhivich, R Lippmann Technical Report 112, MIT Lincoln Laboratory, 2007 | 47 | 2007 |
Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses MD Bond, GZ Baker, SZ Guyer Proceedings of the 31st ACM SIGPLAN Conference on Programming Language …, 2010 | 43 | 2010 |
{USBESAFE}: An {End-Point} Solution to Protect Against {USB-Based} Attacks A Kharraz, BL Daley, GZ Baker, W Robertson, E Kirda 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 5 | 2019 |
Flowtables: program skeletal inversion for defeat of interprocedural analysis with unique metamorphism L Jones, R Whelan, J Blackthorne, G Baker Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015 | 2 | 2015 |
The Importance of Benchmarks for Tools that Find or Prevent Buffer Overflows R Lippmann, MZK Kratkiewicz, T Leek, G Baker, R Cunningham | | 2005 |