C.SPENSKY
Home
Publications
Talks
Projects
CV
**Chad Spensky**
Latest
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
Conware: Automated Modeling of Hardware Peripherals
Analyzing and Securing Embedded Systems
Software Engineering: Through the eyes of a hacker, academic, employee, and CEO
The State of Authentication
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems
Trust, Assurance, and Protection for Microelectronics
New Venture Competition Info Session
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
MIT Enteprise Forum
Defcon CTF Finals
The Leakage-Resilience Dilemma
Toward the Analysis of Embedded Firmware through Automated Re-hosting
Evolutionary Computation for Improving Malware Analysis
Why Computer Science Research is Broken
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Systems and Methods for Single Device Authentication
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
SoK: Privacy on Mobile Devices – It’s Complicated
Towards Transparent Introspection
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
Using Open-source Hardware to Support Disadvantaged Communications
Live Disk Forensics on Bare Metal
Discovering Access-control Misconfigurations: New Approaches and Evaluation Methodologies
Practical Misconfiguration Identification in Access-Control Systems
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
Cite
×