Follow
Audrey Dutcher
Audrey Dutcher
Student, Arizona State University
Verified email at rhelmot.io - Homepage
Title
Cited by
Cited by
Year
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
12212016
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
11432016
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
282018
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation
HJ Tay, K Zeng, JM Vadayath, AS Raj, A Dutcher, T Reddy, W Gibbs, ...
32nd USENIX Security Symposium (USENIX Security 23), 5791-5808, 2023
62023
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning
KK Pal, AP Bajaj, P Banerjee, A Dutcher, M Nakamura, ZL Basque, ...
2024 IEEE Symposium on Security and Privacy (SP), 152-152, 2024
12024
angr: A Powerful and User-friendly Binary Analysis Platform
Y Shoshitaishvili, R Wang, A Dutcher, C Kruegel, G Vigna
2023
Identifying Program Entropy Characteristics with Symbolic Execution
AA Dutcher
University of California, Santa Barbara, 2019
2019
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services
W Gibbs, AS Raj, JM Vadayath, HJ Tay, J Miller, A Ajayan, ZL Basque, ...
The system can't perform the operation now. Try again later.
Articles 1–8