Spensky, Chad
16  results:
Search for persons X
?
1

TEEzz: Fuzzing Trusted Applications on COTS Android Devices:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Busch, Marcel ; Machiry, Aravind ; Spensky, Chad... - p. 1204-1219 , 2023
 
?
2

Conware: Automated Modeling of Hardware Peripherals:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Spensky, Chad ; Machiry, Aravind ; Redini, Nilo... - p. 95-109 , 2021
 
?
3

TRUST.IO: Protecting Physical Interfaces on Cyber-physical ..:

, In: 2020 IEEE Conference on Communications and Network Security (CNS),
 
?
4

Karonte: Detecting Insecure Multi-binary Interactions in Em..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Redini, Nilo ; Machiry, Aravind ; Wang, Ruoyu... - p. 1544-1561 , 2020
 
?
5

Evolutionary computation for improving malware analysis:

, In: Proceedings of the 6th International Workshop on Genetic Improvement,
Leach, Kevin ; Dougherty, Ryan ; Spensky, Chad.. - p. 18-19 , 2019
 
?
6

The Leakage-Resilience Dilemma:

, In: Lecture Notes in Computer Science; Computer Security – ESORICS 2019,
Ward, Bryan C. ; Skowyra, Richard ; Spensky, Chad.. - p. 87-106 , 2019
 
?
7

SoK: Privacy on Mobile Devices – It's Complicated:

Spensky, Chad ; Stewart, Jeffrey ; Yerukhimovich, Arkady...
Proceedings on Privacy Enhancing Technologies.  2016 (2016)  3 - p. 96-116 , 2016
 
?
8

Discovering access-control misconfigurations : new appro..:

, In: Proceedings of the second ACM conference on Data and Application Security and Privacy,
Bauer, Lujo ; Liang, Yuan ; Reiter, Michael K.. - p. 95-104 , 2012
 
?
9

LL-SmartCard:

Spensky, Chad
doi:10.5281/zenodo.4279823.  , 2020
 
?
 
1-15