Seguir
Sam L. Thomas
Sam L. Thomas
Chief Scientist, BINARLY, Inc.
Dirección de correo verificada de binarly.io - Página principal
Título
Citado por
Citado por
Año
HumIDIFy: a tool for hidden functionality detection in firmware
SL Thomas, FD Garcia, T Chothia
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
422017
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality
SL Thomas, T Chothia, FD Garcia
European Symposium on Research in Computer Security, 513-531, 2017
372017
Backdoors: Definition, Deniability and Detection
SL Thomas, A Francillon
Proceedings of the 21st International Symposium on Research in Attacks …, 2018
292018
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning
C McMahon Stone, SL Thomas, M Vanhoef, J Henderson, N Bailluet, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Backdoor Detection Systems for Embedded Devices
SL Thomas
University of Birmingham, 2018
82018
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
Z Chen, SL Thomas, FD Garcia
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Cutting Through the Complexity of Reverse Engineering Embedded Devices
SL Thomas, J Van den Herrewegen, G Vasilakis, Z Chen, M Ordean, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 360-389, 2021
52021
Organising monkeys or How to run a hacking club
AI Radu, SL Thomas
Workshop on Cybersecurity Training & Education (VIBRANT15), 2015
52015
Finding software bugs in embedded devices
A Francillon, SL Thomas, A Costin
Security of Ubiquitous Computing Systems: Selected Topics, 183-197, 2021
32021
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware—Supplementary Material
Z Chen, SL Thomas, FD Garcia
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–10