Follow
Christophe Hauser
Title
Cited by
Cited by
Year
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
9552016
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1.1-8.1, 2015
3762015
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
182011
A taint marking approach to confidentiality violation detection
C Hauser, F Tronel, J Reid, C Fidge
Proceedings of the Tenth Australasian Information Security Conference-Volume …, 2012
162012
Intrusion detection in distributed systems, an approach based on taint marking
C Hauser, F Tronel, C Fidge, L Mé
2013 IEEE International Conference on Communications (ICC), 1962-1967, 2013
122013
Bin2vec: learning representations of binary executable programs for security tasks
S Arakelyan, S Arasteh, C Hauser, E Kline, A Galstyan
Springer Cybersecurity Journal, 2021
112021
et almbox. 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 0
6
NS3: Neuro-Symbolic Semantic Code Search
S Arakelyan, A Hakhverdyan, M Allamanis, C Hauser, L Garcia, X Ren
arXiv preprint arXiv:2205.10674, 2022
32022
Sleak: Automating address space layout derandomization
C Hauser, J Menon, Y Shoshitaishvili, R Wang, G Vigna, C Kruegel
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
22019
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
R Chevalier, S Cristalli, C Hauser, Y Shoshitaishvili, R Wang, C Kruegel, ...
Conference on Data and Application Security and Privacy (CODASPY), 11, 2019
22019
A binary analysis approach to retrofit security in input parsing routines
J Menon, C Hauser, Y Shoshitaishvili, S Schwab
IEEE Symposium on Security and Privacy Workshops, 2018
22018
A basis for intrusion detection in distributed systems using kernel-level data tainting.
C Hauser
Supélec, 2013
22013
Détection d’intrusion dans les systèmes distribués par propagation de teinte au niveau noyau
C Hauser
Ph. D. thesis, University of Rennes 1, France (Jun 2013), 2013
22013
Distributed intrusion detection, an approach based on taint marking
C Hauser, F Tronel, C Fidge, L Mé
Proceedings of the IEEE International Conference on Computer Communications …, 2013
22013
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ...
USENIX Security, 2022
12022
Perfume: Programmatic extraction and refinement for usability of mathematical expression
N Weideman, VK Felkner, WC Wu, J May, C Hauser, L Garcia
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
12021
Probabilist modeling of musical chord sequences for music analysis
C Hauser
12009
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
C Weideman, Nicolaas and Wang, Haoda and Kann, Tyler and Zahabizadeh ...
The 25th International Symposium on Research in Attacks, Intrusions and …, 2022
2022
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering
H Wang, C Hauser, USC Luis Garcia
IEEE Security and Privacy Workshops, 2022
2022
Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks
C Hauser
Association for Computing Machinery, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20