Cited By
View all- Wang JSharp MWu CZeng QLuo LCalandrino JTroncoso C(2023)Can a deep learning model for one architecture be used for others?Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620648(7339-7356)Online publication date: 9-Aug-2023
- Kim HOzmen MCelik ZBianchi AXu DCalandrino JTroncoso C(2023)PatchVerifProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620406(3011-3028)Online publication date: 9-Aug-2023
- Ma XZeng QChi HLuo LHui PAmiri Sani ANurmi PLiu Y(2023)No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT FirmwareProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596857(205-218)Online publication date: 18-Jun-2023
- Show More Cited By