Follow
Stanislav Dashevskyi
Stanislav Dashevskyi
Forescout Technologies
Verified email at forescout.com - Homepage
Title
Cited by
Cited by
Year
An automatic method for assessing the versions affected by a vulnerability
VH Nguyen, S Dashevskyi, F Massacci
Empirical Software Engineering 21, 2268-2297, 2016
522016
A screening test for disclosed vulnerabilities in foss components
S Dashevskyi, AD Brucker, F Massacci
IEEE Transactions on Software Engineering 45 (10), 945-966, 2018
332018
Fine-grained code coverage measurement in automated black-box android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
222020
An effective android code coverage tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
172018
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
172017
TESTREX: a Testbed for Repeatable Exploits.
S Dashevskyi, DR Dos Santos, F Massacci, A Sabetta
CSET, 2014
17*2014
Delta-bench: Differential benchmark for static analysis security testing tools
I Pashchenko, S Dashevskyi, F Massacci
2017 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2017
152017
On the security cost of using a free and open source component in a proprietary product
S Dashevskyi, AD Brucker, F Massacci
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
152016
Dissecting android cryptocurrency miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
132020
Vulnerability analysis of software components
AD Brucker, S Dashevskyi
US Patent 10,691,808, 2020
92020
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android
S Dashevskyi, O Gadyatskaya, A Pilgun, Y Zhauniarovich
Proc. of CCS 10 (3243734.3278524), 2018
92018
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices
D dos Santos, S Dashevskyi, J Wetzels, A Amri
Forescout Research Labs, 2021
52021
An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags
G Di Tizio, F Massacci, L Allodi, S Dashevskyi, J Mirkovic
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 56-65, 2020
42020
NAME:WRECK Breaking and fixing DNS implementations
D dos Santos, S Dashevskyi, A Amri, J Wetzels, O Shlomi, M Kol
Black Hat Asia, 2021
32021
On the Effort for Security Maintenance of Open Source Components
S Dashevskyi, AD Brucker, F Massacci
Workshop on the Economics of Information Security (WEIS), 2018
3*2018
An Introduction to Data Analytics For Software Security
L ben Othmane, AD Brucker, S Dashevskyi, P Tsalovski
Empirical Research for Software Security: Foundations and Experience, 69-94, 2017
22017
RFC 9267: Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing.
S Dashevskyi, DR dos Santos, J Wetzels, A Amri
https://datatracker.ietf.org/doc/html/rfc9267, 2022
2022
Attacking and Defending Healthcare Networks
S Dashevskyi, DR dos Santos, E Costante
CYBER-PHYSICAL THREAT INTELLIGENCE FOR CRITICAL INFRASTRUCTURES SECURITY, 415, 2021
2021
How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices
Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels, Amine Amri
Black Hat Europe, 2020
2020
Security assessment of open source third-parties applications
S Dashevskyi
University of Trento, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20