Follow
Andrew Fasano
Title
Cited by
Cited by
Year
{AVLeak}: Fingerprinting Antivirus Emulators through {Black-Box} Testing
J Blackthorne, A Bulazel, A Fasano, P Biernat, B Yener
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
412016
{AutoCTF}: Creating Diverse Pwnables via Automated Bug Injection
P Hulin, A Davis, R Sridhar, A Fasano, C Gallagher, A Sedlacek, T Leek, ...
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
152017
SoK: Enabling security analyses of embedded systems via rehosting
A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
82021
Evaluating synthetic bugs
J Bundt, A Fasano, B Dolan-Gavitt, W Robertson, T Leek
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
72021
The rode0day to less-buggy programs
A Fasano, T Leek, B Dolan-Gavitt, J Bundt
IEEE Security & Privacy 17 (6), 84-88, 2019
52019
Entropy poisoning from the hypervisor
M Alt, W Barto, A Fasano, A K-ing
Unpublished class project, 2015
32015
PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis
L Craig, A Fasano, T Ballo, T Leek, B Dolan-Gavitt, W Robertson
Workshop on Binary Analysis Research (BAR) 2021, 21, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–7