Follow
Christophe Hauser
Christophe Hauser
Verified email at dartmouth.edu - Homepage
Title
Cited by
Cited by
Year
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE symposium on security and privacy (SP), 138-157, 2016
12662016
Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Y Shoshitaishvili, R Wang, C Hauser, C Kruegel, G Vigna
NDSS 1, 1-1, 2015
4852015
Bin2vec: learning representations of binary executable programs for security tasks
S Arakelyan, S Arasteh, C Hauser, E Kline, A Galstyan
Springer Cybersecurity Journal, 2021
232021
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ...
USENIX Security, 2022
202022
Information flow control for intrusion detection derived from mac policy
S Geller, C Hauser, F Tronel, VVT Tong
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
192011
A taint marking approach to confidentiality violation detection
C Hauser, F Tronel, J Reid, C Fidge
Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012
162012
Intrusion detection in distributed systems, an approach based on taint marking
C Hauser, F Tronel, C Fidge, L Mé
2013 IEEE International Conference on Communications (ICC), 1962-1967, 2013
122013
NS3: Neuro-symbolic semantic code search
S Arakelyan, A Hakhverdyan, M Allamanis, L Garcia, C Hauser, X Ren
Advances in Neural Information Processing Systems 35, 10476-10491, 2022
62022
et almbox. 2016. Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls, N Stephens, M Polino, A Dutcher, ...
2016 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, 0
6
Sleak: Automating address space layout derandomization
C Hauser, J Menon, Y Shoshitaishvili, R Wang, G Vigna, C Kruegel
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
52019
Fine-grained coverage-based fuzzing
WC Wu, B Nongpoh, M Nour, M Marcozzi, S Bardin, C Hauser
ACM Transactions on Software Engineering and Methodology 33 (5), 1-41, 2024
42024
Perfume: Programmatic extraction and refinement for usability of mathematical expression
N Weideman, VK Felkner, WC Wu, J May, C Hauser, L Garcia
Proceedings of the 2021 Research on offensive and defensive techniques in …, 2021
32021
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
R Chevalier, S Cristalli, C Hauser, Y Shoshitaishvili, R Wang, C Kruegel, ...
Conference on Data and Application Security and Privacy (CODASPY), 11, 2019
32019
A binary analysis approach to retrofit security in input parsing routines
J Menon, C Hauser, Y Shoshitaishvili, S Schwab
IEEE Symposium on Security and Privacy Workshops, 2018
32018
A basis for intrusion detection in distributed systems using kernel-level data tainting.
C Hauser
Supélec, 2013
22013
Détection d’intrusion dans les systèmes distribués par propagation de teinte au niveau noyau
C Hauser
Ph. D. thesis, University of Rennes 1, France (Jun 2013), 2013
22013
Distributed intrusion detection, an approach based on taint marking
C Hauser, F Tronel, C Fidge, L Mé
Proceedings of the IEEE International Conference on Computer Communications …, 2013
22013
Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications
R Tandon, H Wang, N Weideman, S Arakelyan, G Bartlett, C Hauser, ...
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
12023
Street Rep: A Privacy-Preserving Reputation Aggregation System
C Hauser, S Nilizadeh, Y Shoshitaishvili, N Trieu, S Ravi, C Kruegel, ...
Cryptology ePrint Archive, 2023
12023
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
C Weideman, Nicolaas and Wang, Haoda and Kann, Tyler and Zahabizadeh ...
The 25th International Symposium on Research in Attacks, Intrusions and …, 2022
1*2022
The system can't perform the operation now. Try again later.
Articles 1–20