Dowsing for overflows: a guided fuzzer to find buffer boundary violations. I Haller, A Slowinska, M Neugschwandtner, H Bos USENIX Security Symposium, 49-64, 2013 | 315 | 2013 |
Ifuzzer: An evolutionary interpreter fuzzer using genetic programming S Veggalam, S Rawat, I Haller, H Bos Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 106 | 2016 |
TypeSan: Practical type confusion detection I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 94 | 2016 |
Shrinkwrap: Vtable protection without loose ends I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 65 | 2015 |
The borg: Nanoprobing binaries for buffer overreads M Neugschwandtner, P Milani Comparetti, I Haller, H Bos Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 65 | 2015 |
Design of interpolation functions for subpixel-accuracy stereo-vision systems I Haller, S Nedevschi IEEE Transactions on image processing 21 (2), 889-898, 2011 | 60 | 2011 |
Real-time semi-global dense stereo solution with improved sub-pixel accuracy I Haller, C Pantilie, F Oniga, S Nedevschi 2010 IEEE Intelligent Vehicles Symposium, 369-376, 2010 | 56 | 2010 |
GPU optimization of the SGM stereo algorithm I Haller, S Nedevschi Proceedings of the 2010 IEEE 6th International Conference on Intelligent …, 2010 | 45 | 2010 |
Real-time obstacle detection using dense stereo vision and dense optical flow CD Pantilie, S Bota, I Haller, S Nedevschi Proceedings of the 2010 IEEE 6th International Conference on Intelligent …, 2010 | 40 | 2010 |
Mempick: High-level data structure detection in c/c++ binaries I Haller, A Slowinska, H Bos 2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013 | 32 | 2013 |
Dowser: a guided fuzzer to find buffer overflow vulnerabilities I Haller, A Slowinska, M Neugschwandtner, H Bos Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013 | 30 | 2013 |
Scalable data structure detection and classification for C/C++ binaries I Haller, A Slowinska, H Bos Empirical Software Engineering 21, 778-810, 2016 | 23 | 2016 |
FPGA based TRNG using automatic calibration H Istvan, A Suciu, O Cret 2009 IEEE 5th International Conference on Intelligent Computer Communication …, 2009 | 22 | 2009 |
METAlloc: Efficient and comprehensive metadata management for software security hardening I Haller, E Van Der Kouwe, C Giuffrida, H Bos Proceedings of the 9th European Workshop on System Security, 1-6, 2016 | 21 | 2016 |
High-speed clock recovery for low-cost FPGAs I Haller, ZF Baruch 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010 | 9 | 2010 |
Statistical method for sub-pixel interpolation function estimation I Haller, C Pantilie, T Mariţa, S Nedevschi 13th International IEEE Conference on Intelligent Transportation Systems …, 2010 | 8 | 2010 |
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables) A Slowinska, I Haller, A Bacs, S Baranga, H Bos Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 7 | 2014 |
A secret-free hypervisor: Rethinking isolation in the age of speculative vulnerabilities H Xia, D Zhang, W Liu, I Haller, B Sherwin, D Chisnall 2022 IEEE Symposium on Security and Privacy (SP), 370-385, 2022 | 6 | 2022 |
Real-time image rectification and stereo reconstruction system on the gpu CD Pantilie, I Haller, M Drulea, S Nedevschi 2011 10th International Symposium on Parallel and Distributed Computing, 79-85, 2011 | 6 | 2011 |
Dowser: A guided fuzzer for finding buffer overflow vulnerabilities I Haller, A Slowinska, M Neugschwandtner, H Bos ; login:: the magazine of USENIX & SAGE 38 (6), 16-19, 2013 | 5 | 2013 |