Folgen
Khaled Yakdan
Khaled Yakdan
Bestätigte E-Mail-Adresse bei cs.uni-bonn.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
S Eschweiler, K Yakdan, E Gerhards-Padilla
NDSS, 2016
3342016
A comprehensive measurement study of domain generating malware
D Plohmann, K Yakdan, M Klatt, J Bader, E Gerhards-Padilla
25th USENIX Security Symposium (USENIX Security 16), 263-278, 2016
3042016
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
K Yakdan, S Dechand, E Gerhards-Padilla, M Smith
IEEE S&P, 2016
1242016
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
K Yakdan, S Eschweiler, E Gerhards-Padilla, M Smith
NDSS, 2015
1052015
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
932019
Recompile: A decompilation framework for static analysis of binaries
K Yakdan, S Eschweiler, E Gerhards-Padilla
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
142013
BotWatcher: Transparent and Generic Botnet Tracking
T Barabosch, A Dombeck, K Yakdan, E Gerhards-Padilla
RAID, 2015
52015
Helping Johnny to analyze malware
K Yakdan, S Dechand, E Gerhards-Padilla, M Smith
IEEE Security & Privacy (Oakland), San Jose, CA, 2016
22016
A human-centric approach for binary code decompilation
K Yakdan
Universitäts-und Landesbibliothek Bonn, 2018
12018
Cyber Analysis & Defense (CA&D)
T Barabosch, A Dombeck, K Yakdan, E Gerhards-Padilla
Cyberdefense Research Group. Fraunhofer. FKIE, 2015
12015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10