Follow
Fabian Yamaguchi
Fabian Yamaguchi
Whirly Labs (Pty) Ltd, Qwiet.AI, Stellenbosch University
Verified email at codeminers.org - Homepage
Title
Cited by
Cited by
Year
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp, K Rieck
2014 IEEE symposium on security and privacy, 590-604, 2014
9042014
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
4342013
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
Usenix Security Symposium, 2015
3162015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
3112015
Generalized vulnerability extrapolation using abstract syntax trees
F Yamaguchi, M Lottmann, K Rieck
Proceedings of the 28th annual computer security applications conference …, 2012
3092012
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
F Yamaguchi, A Maier, H Gascon, K Rieck
Security and Privacy (SP), 2015 IEEE Symposium on, 2015
2592015
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 20th ACM Conference on Computer and Communications …, 2013
2372013
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
F Yamaguchi, K Rieck
5th USENIX workshop on offensive technologies (WOOT 11), 2011
2302011
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
Security and Privacy in Communication Networks: 11th EAI International …, 2015
1802015
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1652015
Efficient and flexible discovery of php application vulnerabilities
M Backes, K Rieck, M Skoruppa, B Stock, F Yamaguchi
2017 IEEE european symposium on security and privacy (EuroS&P), 334-349, 2017
1182017
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
572017
Pattern-based vulnerability discovery
F Yamaguchi
Niedersächsische Staats-und Universitätsbibliothek Göttingen, 2015
512015
Torben: A practical side-channel attack for deanonymizing tor communication
D Arp, F Yamaguchi, K Rieck
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
422015
Static program analysis as a fuzzing aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
382017
System and method for application security profiling
VA Ionescu, F Yamaguchi, C Conikee, M Gupta
US Patent 10,740,470, 2020
322020
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
322016
System and method for code-based protection of sensitive data
C Conikee, M Lottmann, F Yamaguchi, VA Ionescu
US Patent 11,074,362, 2021
252021
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
WOOT, 2017
192017
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
C Wressnegger, F Yamaguchi, A Maier, K Rieck
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
192016
The system can't perform the operation now. Try again later.
Articles 1–20