Vandal: A scalable security analysis framework for smart contracts. L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ... arXiv preprint arXiv:1809.03981, 2018 | 335 | 2018 |
Nodest: feedback-driven static analysis of Node. js applications BB Nielsen, B Hassanshahi, F Gauthier Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 44 | 2019 |
Combining string abstract domains for JavaScript analysis: An evaluation R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ... Tools and Algorithms for the Construction and Analysis of Systems: 23rd …, 2017 | 38 | 2017 |
AFFOGATO runtime detection of injection attacks for Node.js F Gauthier, B Hassanshahi, A Jordan Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018 | 32 | 2018 |
Fast detection of access control vulnerabilities in php applications F Gauthier, E Merlo 2012 19th Working Conference on Reverse Engineering, 247-256, 2012 | 29 | 2012 |
Extraction and comprehension of moodle's access control model: A case study F Gauthier, D Letarte, T Lavoie, E Merlo 2011 Ninth Annual International Conference on Privacy, Security and Trust, 44-51, 2011 | 29 | 2011 |
Uncovering access control weaknesses and flaws with security-discordant software clones F Gauthier, T Lavoie, E Merlo Proceedings of the 29th annual computer security applications conference …, 2013 | 27 | 2013 |
Experience: model-based, feedback-driven, Greybox web fuzzing with BackREST F Gauthier, B Hassanshahi, B Selwyn-Smith, TN Mai, M Schlüter, ... 36th European Conference on Object-Oriented Programming (ECOOP 2022), 2022 | 15* | 2022 |
JSPChecker: Static detection of context-sensitive cross-site scripting flaws in legacy web applications A Steinhauser, F Gauthier Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016 | 15 | 2016 |
Security model evolution of PHP web applications D Letarte, F Gauthier, E Merlo 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 15 | 2011 |
Unacceptable behavior: Robust pdf malware detection using abstract interpretation A Jordan, F Gauthier, B Hassanshahi, D Zhao Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019 | 14* | 2019 |
Reference abstract domains and applications to string analysis R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ... Fundamenta Informaticae 158 (4), 297-326, 2018 | 13 | 2018 |
Alias-aware propagation of simple pattern-based properties in PHP applications F Gauthier, E Merlo 2012 IEEE 12th International Working Conference on Source Code Analysis and …, 2012 | 10 | 2012 |
Semantic smells and errors in access control models: A case study in PHP F Gauthier, E Merlo 2013 35th International Conference on Software Engineering (ICSE), 1169-1172, 2013 | 7 | 2013 |
Driver generation for java ee web applications J Dietrich, F Gauthier, P Krishnan 2018 25th Australasian Software Engineering Conference (ASWEC), 121-125, 2018 | 6 | 2018 |
Runtime prevention of deserialization attacks F Gauthier, S Bae Proceedings of the ACM/IEEE 44th International Conference on Software …, 2022 | 5 | 2022 |
Scalable static analysis to detect security vulnerabilities: Challenges and solutions F Gauthier, N Keynes, N Allen, D Corney, P Krishnan 2018 IEEE Cybersecurity Development (SecDev), 134-134, 2018 | 5 | 2018 |
The role of program analysis in security vulnerability detection: Then and now C Cifuentes, F Gauthier, B Hassanshahi, P Krishnan, D McCall Computers & security 135, 103463, 2023 | 4 | 2023 |
Detection of malware in documents F Gauthier, S Gaetjen, M Blair US Patent 11,392,697, 2022 | 4 | 2022 |
Taint analysis with access paths N Allen, F Gauthier, A Jordan US Patent 10,789,362, 2020 | 4 | 2020 |