Follow
Fabian Yamaguchi
Fabian Yamaguchi
Whirly Labs (Pty) Ltd, Qwiet.AI, Stellenbosch University
Verified email at codeminers.org - Homepage
Title
Cited by
Cited by
Year
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp, K Rieck
2014 IEEE Symposium on Security and Privacy, 590-604, 2014
6852014
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
4122013
Generalized vulnerability extrapolation using abstract syntax trees
F Yamaguchi, M Lottmann, K Rieck
Proceedings of the 28th annual computer security applications conference …, 2012
2732012
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
Usenix Security Symposium, 2015
2692015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2492015
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
F Yamaguchi, A Maier, H Gascon, K Rieck
Security and Privacy (SP), 2015 IEEE Symposium on, 2015
2272015
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
F Yamaguchi, K Rieck
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
2102011
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 20th ACM Conference on Computer and Communications …, 2013
2042013
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1452015
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
Security and Privacy in Communication Networks: 11th EAI International …, 2015
1362015
Efficient and flexible discovery of php application vulnerabilities
M Backes, K Rieck, M Skoruppa, B Stock, F Yamaguchi
2017 IEEE european symposium on security and privacy (EuroS&P), 334-349, 2017
902017
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
532017
Torben: A practical side-channel attack for deanonymizing tor communication
D Arp, F Yamaguchi, K Rieck
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
392015
Pattern-Based Vulnerability Discovery.
F Yamaguchi
University of Göttingen, 2015
372015
Static program analysis as a fuzzing aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
342017
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
322016
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
WOOT, 2017
192017
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
C Wressnegger, F Yamaguchi, A Maier, K Rieck
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
162016
Leveraging Flawed Tutorials for Seeding {Large-Scale} Web Vulnerability Discovery
T Unruh, B Shastry, M Skoruppa, F Maggi, K Rieck, JP Seifert, ...
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
152017
System and method for application security profiling
VA Ionescu, F Yamaguchi, C Conikee, M Gupta
US Patent 10,740,470, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20