Josselin Feist
Josselin Feist
Trail of Bits
Verified email at - Homepage
Cited by
Cited by
Toward large-scale vulnerability discovery using machine learning
G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Statically detecting use after free on binary code
J Feist, L Mounier, ML Potet
Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis
R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
Slither: A Static Analysis Framework For Smart Contracts
J Feist, G Grieco, A Groce
WETSEB 2019, 2019
Specification of concretization and symbolization policies in symbolic execution
R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion
Proceedings of the 25th International Symposium on Software Testing and …, 2016
Manticore: A user-friendly symbolic execution framework for binaries and smart contracts
M Mossberg, F Manzano, E Hennenfent, A Groce, G Grieco, J Feist, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free
J Feist, L Mounier, S Bardin, R David, ML Potet
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
Guided dynamic symbolic execution using subgraph control-flow information
J Feist, L Mounier, ML Potet
International Conference on Software Engineering and Formal Methods, 76-81, 2016
Slither: a static analysis framework for smart contracts. In 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)
J Feist, G Grieco, A Groce
IEEE, 2019
What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?
A Groce, J Feist, G Grieco, M Colburn
arXiv preprint arXiv:1911.07567, 2019
Finding the needle in the heap: combining binary analysis techniques to trigger use-after-free
J Feist
Grenoble Alpes, 2017
Combining static analyses for helping detection and exploitability vulnerabilities in binary code
L Mounier, J Feist, ML Potet, S Rawat
Echidna: Effective, Usable, and Fast Fuzzing for Smart Contracts
G Grieco, W Song, A Cygan, J Feist, A Groce
I Lille, EG Boix, J Feist, G Grieco, A Groce, EH Lund, L Jaccheri, J Li, ...
The system can't perform the operation now. Try again later.
Articles 1–14