Binary Analysis

Security of the code you execute

Malware Analysis

Are these programs bad or good?

Automatic Exploit Generation

Given a program, generate exploits automatically

Type Inference on Binaries

Recovering source types from binary executables

Anonymity

Balancing anonymity vs. accountability

Verification

Making verification faster

Multi-arch Program

A single binary that runs on multiple platforms

People

Research team members, past and present

Publications

Read about it