Follow
Yan Shoshitaishvili
Title
Cited by
Cited by
Year
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
IEEE Symposium on Security and Privacy, 2016
13972016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens
Internetsociety, 2016
12382016
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1-1, 2015
5252015
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili, M Payer
IEEE Security and Privacy, 2018
4022018
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
J Corina, A Machiry, C Salls, Y Shoshitaishvili, S Hao, C Kruegel, G Vigna
Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017
2312017
Revolver: An automated approach to the detection of evasive web-based malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
22nd USENIX Security Symposium (USENIX Security 13), 637-652, 2013
2172013
Ramblr: Making Reassembly Great Again
R Wang, Y Shoshitaishvili, A Bianchi, A Machiry, J Grosen, P Grosen, ...
Proceedings of the Network and Distributed System Security Symposium, 2017
1942017
Matched and mismatched SOCs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1482019
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
1302020
Angr-the next generation of binary analysis
F Wang, Y Shoshitaishvili
2017 IEEE Cybersecurity Development (SecDev), 8-9, 2017
1172017
{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists
A Oest, Y Safaei, P Zhang, B Wardman, K Tyers, Y Shoshitaishvili, ...
29th USENIX Security Symposium (USENIX Security 20), 379-396, 2020
1122020
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
1072021
Honeyplc: A next-generation honeypot for industrial control systems
E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
942020
Ten Years of {iCTF}: The Good, The Bad, and The Ugly
G Vigna, K Borgolte, J Corbetta, A Doupé, Y Fratantonio, L Invernizzi, ...
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
872014
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
832017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
T Bao, R Wang, Y Shoshitaishvili, D Brumley
IEEE Symposium on Security and Privacy, 2017
802017
{HeapHopper}: Bringing bounded model checking to heap implementation security
M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
27th USENIX Security Symposium (USENIX Security 18), 99-116, 2018
792018
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Y Shoshitaishvili, M Weissbacher, L Dresel, C Salls, R Wang, C Kruegel, ...
Proceedings of the 2017 ACM Conference on Computer and Communications Security, 2017
772017
The wmdp benchmark: Measuring and reducing malicious use with unlearning
N Li, A Pan, A Gopal, S Yue, D Berrios, A Gatti, JD Li, AK Dombrowski, ...
arXiv preprint arXiv:2403.03218, 2024
722024
Steal this movie-automatically bypassing DRM protection in streaming media services
R Wang, Y Shoshitaishvili, C Kruegel, G Vigna
Proceedings of the 22nd USENIX conference on Security, 687-702, 2013
722013
The system can't perform the operation now. Try again later.
Articles 1–20