Personal profile

Ancillary activities

No ancillary activities

Ancillary activities are updated daily

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2016 2016

  • 3 Conference contribution
  • 1 Article

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Veen, V. V. D., Goktas, E., Contag, M., Pawoloski, A., Chen, X., Rawat, S., Bos, H., Holz, T., Athanasopoulos, I. & Giuffrida, C. 16 Aug 2016 Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers, Inc., p. 934-953 20 p. 7546543

Research output: Scientific - peer-reviewConference contribution

Binary Rejuvenation: Applications and Challenges

Oikonomopoulos, A., Giuffrida, C., Rawat, S. & Bos, H. J. 2016 In : IEEE Security & Privacy. 14, 1, p. 68-71

Research output: Scientific - peer-reviewArticle

Ifuzzer: An evolutionary interpreter fuzzer using genetic programming

Veggalam, S., Rawat, S., Haller, I. & Bos, H. Sep 2016 Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer/Verlag, Vol. 9878 LNCS, p. 581-601 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS)

Research output: Scientific - peer-reviewConference contribution

Toward large-scale vulnerability discovery using Machine Learning

Grieco, G., Grinblat, G., Uzal, L., Rawat, S., Feist, J. & Mounier, L. 2016 Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM, p. 85-96

Research output: Scientific - peer-reviewConference contribution