Show case on S2E webpage

Skip to first unread message

Mingxuan Yao

Feb 21, 2024, 6:15:39 PMFeb 21
I hope this message finds you well. My name is Mingxuan Yao, and I would like to extend my gratitude for your efforts in developing S2E, an exceptional tool that has significantly contributed to my research. I am thrilled to share that I have utilized S2E in my study, which has been published in the 32nd USENIX Security Symposium. Here is the link to my paper:
I believe that my research could be a valuable addition to your showcase page (, highlighting the practical applications and impact of S2E. I have prepared a high-level abstract for your review.  Please tell me if you need any more information. 
Title: "Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware" at Georgia Institute of Technology CyFI Lab ( and United States Military Academy 
Authors: Mingxuan Yao (, et al.
Abstract: Description: Web applications provide a wide array of utilities that are abused by malware as a replacement for traditional attacker-controlled servers. Thwarting these Web App-Engaged (WAE) malware requires rapid collaboration between incident responders and web app providers. We developed Marsea, an automated malware analysis pipeline that uses S2E to study WAE malware and enables rapid remediation. Given 10K malware samples, Marsea revealed 893 WAE malware in 97 families abusing 29 web apps. This research uncovered a 226% increase in the number of WAE malware since 2020. To date, we have used Marsea to collaborate with the web app providers to take down 80% of the malicious web app content.
Mingxuan Yao

Vitaly Chipounov

Feb 22, 2024, 12:14:20 PMFeb 22

Done! Congrats for your paper!


You received this message because you are subscribed to the Google Groups "S2E Developer Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
To view this discussion on the web visit
Reply all
Reply to author
0 new messages