Maverick Woo (Shan Leung)

Hello, I am a Systems Scientist at CyLab in Carnegie Mellon University. I received my Ph.D. in Computer Science from Carnegie Mellon in 2009 and joined CyLab in 2011. My current research interests include software security and program analysis, with a focus on algorithm design and budget optimization.

Contact

pooh at cmu dot edu

4720 Forbes Ave., Room 2120
Carnegie Mellon University
Pittsburgh, PA 15213

Publications

  1. Andrew Reynolds, Maverick Woo, Clark Barrett, David Brumley, Tianyi Liang, and Cesare Tinelli, "Scaling Up DPLL(T) String Solvers using Context-Dependent Simplification", in Proceedings of the 29th International Conference on Computer Aided Verification, 2017. (to appear)
  2. Dominic D. Chen, Manuel Egele, Maverick Woo, and David Brumley, "Towards Automated Dynamic Analysis for Linux-based Embedded Firmware ", in Proceedings of the Network and Distributed System Security Symposium, 2016. (open access)
  3. Ilker Nadi Bozkurt, Hai Huang, Bruce Maggs, Andrea Richa, and Maverick Woo, "Mutual Embeddings," in Journal of Interconnection Networks 15.01n02, 2015. (preprint)
  4. Sang Kil Cha, Maverick Woo, and David Brumley, "Program-Adaptive Mutational Fuzzing ," in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015, pp. 725-741. (preprint)
  5. Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley, "ByteWeight: Learning to Recognize Functions in Binary Code ," in Proceedings of the 23rd USENIX Security Symposium, 2014, pp. 845-860. (open access)
  6. Manuel Egele, Maverick Woo, Peter Chapman, and David Brumley, "Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components," in Proceedings of the 23rd USENIX Security Symposium, 2014, pp. 303-317. (open access)
  7. Thanassis Avgerinos, Sang Kil Cha, Alex Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley, "Automatic Exploit Generation," in Communications of the ACM, vol. 57, no. 2, 2014, pp. 74-84. (ACM Author-Izer)
  8. Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley, "Scheduling Black-box Mutational Fuzzing," in Proceedings of the 20th ACM Conference on Computer and Communications Security, 2013, pp. 511-522. (ACM Author-Izer)
  9. Edward J. Schwartz, JongHyup Lee, Maverick Woo, and David Brumley, "Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring," in Proceedings of the 22nd USENIX Security Symposium, 2013, pp. 353-368. (open access)
  10. Jiyong Jang, Maverick Woo, and David Brumley, "Towards Automatic Software Lineage Inference," in Proceedings of the 22nd USENIX Security Symposium, 2013, pp. 81-96. (open access)
  11. Jiyong Jang, Maverick Woo, and David Brumley, "ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions," in USENIX ;login:, vol. 37, no. 6, 2012, pp. 58-67. (preprint)
  12. Jonathan Derryberry, Don Sheehy, Daniel D. Sleator, and Maverick Woo, "Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors," in Proceedings of the 20th Annual Canadian Conference on Computational Geometry, 2008. (open access)
  13. Virginia Vassilevska, Ryan Williams, and Shan Leung Maverick Woo, "Confronting Hardness Using a Hybrid Approach," in Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithm, 2006, pp. 1-10.
  14. Bruce M. Maggs, Gary L. Miller, Ojas Parekh, R. Ravi, and Shan Leung Maverick Woo, "Finding Effective Support-Tree Preconditioners," in Proceedings of the 17th ACM Symposium on Parallelism in Algorithms and Architectures, 2005, pp. 176-185. (ACM Author-Izer)
  15. Umut A. Acar, Guy E. Blelloch, Robert Harper, Jorge L. Vittes, and Shan Leung Maverick Woo, "Dynamizing Static Algorithms, with Applications to Dynamic Trees and History Independence," in Proceedings of the 15th ACM-SIAM Symposium on Discrete Algorithm, 2004, pp. 531-540.
  16. Guy E. Blelloch, Bruce M. Maggs, and Shan Leung Maverick Woo, "Space-Efficient Finger Search on Degree-Balanced Search Trees," in Proceedings of the 14th ACM-SIAM Symposium on Discrete Algorithms, 2003, pp. 374-383.

Program Committee

  1. Annual Computer Security Applications Conference 2017
  2. Annual Computer Security Applications Conference 2016
  3. Annual Computer Security Applications Conference 2015
Last Updated: 2016-06-22