Fabian Yamaguchi
Fabian Yamaguchi
ShiftLeft GmbH, Stellenbosch University
Bestätigte E-Mail-Adresse bei shiftleft.io - Startseite
Zitiert von
Zitiert von
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp, K Rieck
2014 IEEE Symposium on Security and Privacy, 590-604, 2014
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
Usenix Security Symposium, 2015
Generalized vulnerability extrapolation using abstract syntax trees
F Yamaguchi, M Lottmann, K Rieck
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 20th ACM Conference on Computer and Communications …, 2013
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
F Yamaguchi, F Lindner, K Rieck
Proceedings of the 5th USENIX conference on Offensive technologies, 13-13, 2011
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
F Yamaguchi, A Maier, H Gascon, K Rieck
Security and Privacy (SP), 2015 IEEE Symposium on, 2015
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
International Conference on Security and Privacy in Communication Systems …, 2015
Efficient and flexible discovery of php application vulnerabilities
M Backes, K Rieck, M Skoruppa, B Stock, F Yamaguchi
2017 IEEE european symposium on security and privacy (EuroS&P), 334-349, 2017
Pattern-based vulnerability discovery
F Yamaguchi
Niedersächsische Staats-und Universitätsbibliothek Göttingen, 2015
Static program analysis as a fuzzing aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 26-47, 2017
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Torben: A practical side-channel attack for deanonymizing tor communication
D Arp, F Yamaguchi, K Rieck
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
International Conference on Detection of Intrusions and Malware, and …, 2016
Leveraging flawed tutorials for seeding large-scale web vulnerability discovery
T Unruh, B Shastry, M Skoruppa, F Maggi, K Rieck, JP Seifert, ...
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
C Wressnegger, F Yamaguchi, A Maier, K Rieck
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
WOOT, 2017
Analyzing and detecting Flash-based malware using lightweight multi-path exploration
C Wressnegger, F Yamaguchi, D Arp, K Rieck
University of Göttingen, Germany, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20