Follow
Asia Slowinska
Asia Slowinska
IBM Security
Verified email at few.vu.nl
Title
Cited by
Cited by
Year
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
4622006
Dowsing for {Overflows}: A Guided Fuzzer to Find Buffer Boundary Violations
I Haller, A Slowinska, M Neugschwandtner, H Bos
22nd USENIX Security Symposium (USENIX Security 13), 49-64, 2013
2972013
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2702015
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
A Slowinska, T Stancescu, H Bos
NDSS, 2011
2222011
Pointless tainting? evaluating the practicality of pointer tainting
A Slowinska, H Bos
Proceedings of the 4th ACM European conference on Computer systems, 61-74, 2009
1732009
An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries
D Andriesse, X Chen, V Van Der Veen, A Slowinska, H Bos
25th USENIX Security Symposium (USENIX Security 16), 583-600, 2016
1662016
Minemu: The world’s fastest taint tracker
E Bosman, A Slowinska, H Bos
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2011
1542011
Compiler-agnostic function detection in binaries
D Andriesse, A Slowinska, H Bos
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 177-189, 2017
1202017
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
NDSS, 2015
1202015
Body armor for binaries: preventing buffer overflows without recompilation
A Slowinski, T Stancescu, H Bos
2012 USENIX Annual Technical Conference (USENIX ATC 12), 125-137, 2012
662012
Safecard: a gigabit ips on the network card
W Bruijn, A Slowinska, K Reeuwijk, T Hruby, L Xu, H Bos
International Workshop on Recent Advances in Intrusion Detection, 311-330, 2006
582006
Who allocated my memory? Detecting custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 22-31, 2013
372013
Mempick: High-level data structure detection in c/c++ binaries
I Haller, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013
322013
The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
A Slowinska, H Bos
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
302007
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, M Neugschwandtner, H Bos
Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013
272013
Parallax: Implicit code integrity verification using return-oriented programming
D Andriesse, H Bos, A Slowinska
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
262015
Scalable data structure detection and classification for C/C++ binaries
I Haller, A Slowinska, H Bos
Empirical Software Engineering 21 (3), 778-810, 2016
212016
On the detection of custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
Empirical Software Engineering 21 (3), 753-777, 2016
172016
DDE: dynamic data structure excavation
A Slowinska, T Stancescu, H Bos
Proceedings of the first ACM asia-pacific workshop on Workshop on systems, 13-18, 2010
152010
System-level support for intrusion recovery
A Bacs, R Vermeulen, A Slowinska, H Bos
International Conference on Detection of Intrusions and Malware, and …, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20