Spensky, Chad
16  results:
Search for persons X
?
1

TEEzz: Fuzzing Trusted Applications on COTS Android Devices:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Busch, Marcel ; Machiry, Aravind ; Spensky, Chad... - p. 1204-1219 , 2023
 
?
2

Conware: Automated Modeling of Hardware Peripherals:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Spensky, Chad ; Machiry, Aravind ; Redini, Nilo... - p. 95-109 , 2021
 
?
3

Karonte: Detecting Insecure Multi-binary Interactions in Em..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Redini, Nilo ; Machiry, Aravind ; Wang, Ruoyu... - p. 1544-1561 , 2020
 
?
4

TRUST.IO: Protecting Physical Interfaces on Cyber-physical ..:

, In: 2020 IEEE Conference on Communications and Network Security (CNS),
 
?
5

LL-SmartCard:

Spensky, Chad
doi:10.5281/zenodo.4279823.  , 2020
 
?
 
?
9

mit-ll/LL-Smartcard: DOI tagged:

Lou Bellaire ; Chad Spensky ; hhu-work
https://github.com/mit-ll/LL-Smartcard/tree/V1.1.  , 2020
 
?
11

Evolutionary computation for improving malware analysis:

, In: Proceedings of the 6th International Workshop on Genetic Improvement,
Leach, Kevin ; Dougherty, Ryan ; Spensky, Chad.. - p. 18-19 , 2019
 
?
12

The Leakage-Resilience Dilemma:

, In: Lecture Notes in Computer Science; Computer Security – ESORICS 2019,
Ward, Bryan C. ; Skowyra, Richard ; Spensky, Chad.. - p. 87-106 , 2019
 
?
15

SoK: Privacy on Mobile Devices – It's Complicated:

Spensky, Chad ; Stewart, Jeffrey ; Yerukhimovich, Arkady...
Proceedings on Privacy Enhancing Technologies.  2016 (2016)  3 - p. 96-116 , 2016
 
1-15