Obserwuj
Asia Slowinska
Asia Slowinska
Zweryfikowany adres z few.vu.nl
Tytuł
Cytowane przez
Cytowane przez
Rok
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
4952006
Dowsing for {Overflows}: A Guided Fuzzer to Find Buffer Boundary Violations
I Haller, A Slowinska, M Neugschwandtner, H Bos
22nd USENIX Security Symposium (USENIX Security 13), 49-64, 2013
3322013
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3202015
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
A Slowinska, T Stancescu, H Bos
NDSS, 2011
2422011
An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries
D Andriesse, X Chen, V Van Der Veen, A Slowinska, H Bos
25th USENIX security symposium (USENIX security 16), 583-600, 2016
2092016
Pointless tainting? evaluating the practicality of pointer tainting
A Slowinska, H Bos
Proceedings of the 4th ACM European conference on Computer systems, 61-74, 2009
1862009
Minemu: The world’s fastest taint tracker
E Bosman, A Slowinska, H Bos
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
1742011
Compiler-agnostic function detection in binaries
D Andriesse, A Slowinska, H Bos
2017 IEEE European symposium on security and privacy (EuroS&P), 177-189, 2017
1412017
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
NDSS, 2015
1302015
Body armor for binaries: preventing buffer overflows without recompilation
A Slowinski, T Stancescu, H Bos
2012 USENIX Annual Technical Conference (USENIX ATC 12), 125-137, 2012
702012
Safecard: a gigabit ips on the network card
W De Bruijn, A Slowinska, K Van Reeuwijk, T Hruby, L Xu, H Bos
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
562006
Who allocated my memory? Detecting custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 22-31, 2013
422013
Mempick: High-level data structure detection in c/c++ binaries
I Haller, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013
352013
Parallax: Implicit code integrity verification using return-oriented programming
D Andriesse, H Bos, A Slowinska
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
332015
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, M Neugschwandtner, H Bos
Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013
332013
The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
A Slowinska, H Bos
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
302007
Scalable data structure detection and classification for C/C++ binaries
I Haller, A Slowinska, H Bos
Empirical Software Engineering 21, 778-810, 2016
242016
On the detection of custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
Empirical Software Engineering 21, 753-777, 2016
212016
DDE: dynamic data structure excavation
A Slowinska, T Stancescu, H Bos
Proceedings of the first ACM asia-pacific workshop on Workshop on systems, 13-18, 2010
162010
System-level support for intrusion recovery
A Bacs, R Vermeulen, A Slowinska, H Bos
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
152013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20