Josselin Feist
Josselin Feist
Trail of Bits
Email verificata su - Home page
Citata da
Citata da
Toward large-scale vulnerability discovery using machine learning
G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Statically detecting use after free on binary code
J Feist, L Mounier, ML Potet
Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis
R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
Slither: A Static Analysis Framework For Smart Contracts
J Feist, G Grieco, A Groce
WETSEB 2019, 2019
Manticore: A user-friendly symbolic execution framework for binaries and smart contracts
M Mossberg, F Manzano, E Hennenfent, A Groce, G Grieco, J Feist, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Specification of concretization and symbolization policies in symbolic execution
R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion
Proceedings of the 25th International Symposium on Software Testing and …, 2016
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free
J Feist, L Mounier, S Bardin, R David, ML Potet
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
Slither: a static analysis framework for smart contracts. In 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)
J Feist, G Grieco, A Groce
IEEE, 2019
Guided dynamic symbolic execution using subgraph control-flow information
J Feist, L Mounier, ML Potet
International Conference on Software Engineering and Formal Methods, 76-81, 2016
What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
A Groce, J Feist, G Grieco, M Colburn
International Conference on Financial Cryptography and Data Security, 634-653, 2020
Echidna: effective, usable, and fast fuzzing for smart contracts
G Grieco, W Song, A Cygan, J Feist, A Groce
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
Finding the needle in the heap: combining binary analysis techniques to trigger use-after-free
J Feist
Grenoble Alpes, 2017
Combining static analyses for helping detection and exploitability vulnerabilities in binary code
L Mounier, J Feist, ML Potet, S Rawat
I Lille, EG Boix, J Feist, G Grieco, A Groce, EH Lund, L Jaccheri, J Li, ...
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–14