Personal profile

Ancillary activities

No ancillary activities

Last update Ancillary Activities: Amsterdam (2018-01-21)

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2016 2016

  • 3 Conference contribution
  • 1 Article

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Veen, V. V. D., Goktas, E., Contag, M., Pawoloski, A., Chen, X., Rawat, S., Bos, H., Holz, T., Athanasopoulos, I. & Giuffrida, C. 16 Aug 2016 Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers, Inc., p. 934-953 20 p. 7546543

Research output: Scientific - peer-reviewConference contribution

Binary Rejuvenation: Applications and Challenges

Oikonomopoulos, A., Giuffrida, C., Rawat, S. & Bos, H. J. 2016 In : IEEE Security & Privacy. 14, 1, p. 68-71

Research output: Scientific - peer-reviewArticle

Ifuzzer: An evolutionary interpreter fuzzer using genetic programming

Veggalam, S., Rawat, S., Haller, I. & Bos, H. Sep 2016 Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer/Verlag, Vol. 9878 LNCS, p. 581-601 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS)

Research output: Scientific - peer-reviewConference contribution

Toward large-scale vulnerability discovery using Machine Learning

Grieco, G., Grinblat, G., Uzal, L., Rawat, S., Feist, J. & Mounier, L. 2016 Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM, p. 85-96

Research output: Scientific - peer-reviewConference contribution