Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE symposium on security and privacy (SP), 138-157, 2016 | 1300 | 2016 |
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware. Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna NDSS 1, 1-1, 2015 | 496 | 2015 |
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ... USENIX Security, 2022 | 23 | 2022 |
Bin2vec: learning representations of binary executable programs for security tasks S Arakelyan, S Arasteh, C Hauser, E Kline, A Galstyan Springer Cybersecurity Journal, 2021 | 23 | 2021 |
Information flow control for intrusion detection derived from mac policy S Geller, C Hauser, F Tronel, VVT Tong 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 19 | 2011 |
A taint marking approach to confidentiality violation detection C Hauser, F Tronel, J Reid, C Fidge Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012 | 16 | 2012 |
Intrusion detection in distributed systems, an approach based on taint marking C Hauser, F Tronel, C Fidge, L Mé 2013 IEEE International Conference on Communications (ICC), 1962-1967, 2013 | 12 | 2013 |
NS3: Neuro-symbolic semantic code search S Arakelyan, A Hakhverdyan, M Allamanis, L Garcia, C Hauser, X Ren Advances in Neural Information Processing Systems 35, 10476-10491, 2022 | 7 | 2022 |
et almbox. 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ... 2016 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 0 | 6 | |
Sleak: Automating address space layout derandomization C Hauser, J Menon, Y Shoshitaishvili, R Wang, G Vigna, C Kruegel Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 5 | 2019 |
Fine-grained coverage-based fuzzing WC Wu, B Nongpoh, M Nour, M Marcozzi, S Bardin, C Hauser ACM Transactions on Software Engineering and Methodology 33 (5), 1-41, 2024 | 4 | 2024 |
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images R Chevalier, S Cristalli, C Hauser, Y Shoshitaishvili, R Wang, C Kruegel, ... Conference on Data and Application Security and Privacy (CODASPY), 11, 2019 | 4 | 2019 |
Perfume: Programmatic extraction and refinement for usability of mathematical expression N Weideman, VK Felkner, WC Wu, J May, C Hauser, L Garcia Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021 | 3 | 2021 |
A binary analysis approach to retrofit security in input parsing routines J Menon, C Hauser, Y Shoshitaishvili, S Schwab IEEE Symposium on Security and Privacy Workshops, 2018 | 3 | 2018 |
A basis for intrusion detection in distributed systems using kernel-level data tainting. C Hauser Supélec, 2013 | 2 | 2013 |
Détection d’intrusion dans les systèmes distribués par propagation de teinte au niveau noyau C Hauser Ph. D. thesis, University of Rennes 1, France (Jun 2013), 2013 | 2 | 2013 |
Distributed intrusion detection, an approach based on taint marking C Hauser, F Tronel, C Fidge, L Mé Proceedings of the IEEE International Conference on Computer Communications …, 2013 | 2 | 2013 |
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications R Tandon, H Wang, N Weideman, S Arakelyan, G Bartlett, C Hauser, ... Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 1 | 2023 |
Street Rep: A Privacy-Preserving Reputation Aggregation System C Hauser, S Nilizadeh, Y Shoshitaishvili, N Trieu, S Ravi, C Kruegel, ... Cryptology ePrint Archive, 2023 | 1 | 2023 |
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables C Weideman, Nicolaas and Wang, Haoda and Kann, Tyler and Zahabizadeh ... The 25th International Symposium on Research in Attacks, Intrusions and …, 2022 | 1* | 2022 |