Yan Shoshitaishvili
Yan Shoshitaishvili
Email verificata su asu.edu - Home page
Titolo
Citata da
Citata da
Anno
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
4492016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
4322016
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS, 2015
1842015
Revolver: An automated approach to the detection of evasive web-based malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
22nd {USENIX} Security Symposium ({USENIX} Security 13), 637-652, 2013
1572013
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili, M Payer
IEEE Security and Privacy, 2018
992018
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the Network and Distributed System Security Symposium, 2017
522017
Blacksheep: detecting compromised hosts in homogeneous crowds
A Bianchi, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
522012
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017
502017
Ten years of ictf: The good, the bad, and the ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
2014 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2014
472014
Steal this movie-automatically bypassing DRM protection in streaming media services
R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 22nd USENIX conference on Security, 687-702, 2013
472013
Pexy: The other side of exploit kits
G De Maio, A Kapravelos, Y Shoshitaishvili, C Kruegel, G Vigna
International conference on detection of intrusions and malware, and …, 2014
372014
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017
232017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
T Bao, R Wang, Y Shoshitaishvili, D Brumley
IEEE Symposium on Security and Privacy, 2017
232017
How the {ELF} Ruined Christmas
A Di Federico, A Cama, Y Shoshitaishvili, C Kruegel, G Vigna
24th {USENIX} Security Symposium ({USENIX} Security 15), 643-658, 2015
232015
Bootstomp: on the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 781-798, 2017
222017
Protecting web-based single sign-on protocols against relying party impersonation attacks through a dedicated bi-directional authenticated secure channel
Y Cao, Y Shoshitaishvili, K Borgolte, C Kruegel, G Vigna, Y Chen
International Workshop on Recent Advances in Intrusion Detection, 276-298, 2014
18*2014
Angr-the next generation of binary analysis
F Wang, Y Shoshitaishvili
2017 IEEE Cybersecurity Development (SecDev), 8-9, 2017
162017
Do you feel lucky? A large-scale analysis of risk-rewards trade-offs in cyber security
Y Shoshitaishvili, L Invernizzi, A Doupe, G Vigna
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1649-1656, 2014
162014
Portrait of a privacy invasion: Detecting relationships through large-scale photo analysis
Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings on Privacy Enhancing Technologies 2015 (1), 41-60, 2015
152015
Heaphopper: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th {USENIX} Security Symposium ({USENIX} Security 18), 99-116, 2018
112018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20