Dr. Pongsin Poosankam

Adjunct Faculty

Affiliated Member

Biography

Dr. Pongsin Poosankam

Biography

Education

  • August 2013 Ph.D. in Computer Science  Carnegie Mellon University Pittsburgh, PA USA
  • May 2011 M.S. in Computer Science Carnegie Mellon University Pittsburgh, PA USA
  • May 2005 B.S. in Computer Science (with minors in Maths and Physics) Pittsburgh, PA USA
DEPARTMENT
ECE/ AiCE Program
OFFICE LOCATION
Bridge 608, 6th Floor, CMKL University
Phone
-
  • August 2013 Ph.D. in Computer Science  Carnegie Mellon University Pittsburgh, PA USA
  • May 2011 M.S. in Computer Science Carnegie Mellon University Pittsburgh, PA USA
  • May 2005 B.S. in Computer Science (with minors in Maths and Physics) Pittsburgh, PA USA

No education background

  • Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
    Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, and Dawn
    Song. In Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA USA, June 2012.
  • Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators.Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, and Petros Maniatis. InProceedings of the International Conference on Architectural Support for Programming Languagesand Operating Systems (ASPLOS), London, UK, March 2012.
  • MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, and DawnSong. In Proceedings of the USENIX Security Symposium, San Francisco, CA USA, August 2011.
  • Take Two Software Updates and See Me in the Morning: The Case for Software SecurityEvaluations of Medical Devices.Steve Hanna, Rolf Rolles, Andres Molina-Markham, Pongsin Poosankam, Kevin Fu, and Dawn Song. InProceedings of the USENIX Workshop on Health Security and Privacy (HealthSec), San Francisco, CAUSA, August 2011.
  • Differential Slicing: Identifying Causal Execution Differences for Security Applications.Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, DanielReynaud, and Dawn Song. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland,CA USA, May 2011.
  • DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song. In Proceedings of theAnnual Network and Distributed System Security Symposium, San Diego, CA USA, February 2011.
  • Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware.Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, and Dawn Song. InProceedings of the ACM Conference on Computer and Communication Security (CCS), Chicago, ILUSA, October 2010.
  • HookScout: Proactive Binary-Centric Hook Detection.Heng Yin, Pongsin Poosankam, Steve Hanna, and Dawn Song. In the Proceedings of the Conference onDetection of Intrusions and Malware & Vulnerability Assessment (DIMVA'10), Bonn, Germany, July2010.
  • FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.Prateek Saxena, Steve Hanna, Pongsin Poosankam, and Dawn Song. In Proceedings of the AnnualNetwork and Distributed System Security Symposium (NDSS), San Diego, CA USA, February 2010.
  • Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-engineering.Juan Caballero, Pongsin Poosankam, Christian Kreibich, and Dawn Song. In Proceedings of the ACMConference on Computer and Communication Security (CCS), Chicago, IL USA, November 2009.
  • Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-LevelConstraint-Guided Exploration.Juan Caballero, Zhenkai Liang, Pongsin Poosankam, and Dawn Song. In Proceedings of theInternational Symposium on Recent Advances in Intrusion Detection, Saint-Malo, France, September2009.
  • Loop-Extended Symbolic Execution on Binary Programs.Prateek Saxena, Pongsin Poosankam, Stephen McCamant, and Dawn Song. In Proceedings of theACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), Chicago, IL USA,July 2009.
  • Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng. In Proceedings of the IEEE Securityand Privacy Symposium, Oakland, CA USA, May 2008.
  • Renovo: A Hidden Code Extractor for Packed Executables.Min Gyung Kang, Pongsin Poosankam, and Heng Yin. In Proceedings of the ACM Workshop onRecurring Malcode (WORM), Alexandria, VA USA, October 2007.
  • FiG: Automatic Fingerprint Generation.Juan Caballero, Shobha Venkataraman, Pongsin Poosankam, Min Gyung Kang, Dawn Song and AvrimBlum. In Proceedings of the Annual Network and Distributed System Security Symposium, San Diego,CA USA, February 2007.
  • Design Space and Analysis of Worm Defense Strategies.David Brumley, Li-Hao Liu, Pongsin Poosankam, and Dawn Song. In ACM Symposium on Information,Computer and Communications Security (ASIACCS), Taipei, Taiwan, March 2006.

No publication

  • Computer Security

No technical specialities