Follow
Asia Slowinska
Asia Slowinska
Verified email at few.vu.nl
Title
Cited by
Cited by
Year
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
5032006
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3492015
Dowsing for {Overflows}: A Guided Fuzzer to Find Buffer Boundary Violations
I Haller, A Slowinska, M Neugschwandtner, H Bos
22nd USENIX Security Symposium (USENIX Security 13), 49-64, 2013
3472013
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
A Slowinska, T Stancescu, H Bos
NDSS, 2011
2532011
An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries
D Andriesse, X Chen, V Van Der Veen, A Slowinska, H Bos
25th USENIX security symposium (USENIX security 16), 583-600, 2016
2242016
Pointless tainting? evaluating the practicality of pointer tainting
A Slowinska, H Bos
Proceedings of the 4th ACM European conference on Computer systems, 61-74, 2009
1872009
Minemu: The world’s fastest taint tracker
E Bosman, A Slowinska, H Bos
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
1742011
Compiler-agnostic function detection in binaries
D Andriesse, A Slowinska, H Bos
2017 IEEE European symposium on security and privacy (EuroS&P), 177-189, 2017
1482017
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
NDSS, 2015
1322015
Body armor for binaries: preventing buffer overflows without recompilation
A Slowinski, T Stancescu, H Bos
2012 USENIX Annual Technical Conference (USENIX ATC 12), 125-137, 2012
702012
Safecard: a gigabit ips on the network card
W De Bruijn, A Slowinska, K Van Reeuwijk, T Hruby, L Xu, H Bos
Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006
562006
Who allocated my memory? Detecting custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 22-31, 2013
422013
Mempick: High-level data structure detection in c/c++ binaries
I Haller, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013
362013
Parallax: Implicit code integrity verification using return-oriented programming
D Andriesse, H Bos, A Slowinska
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
332015
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, M Neugschwandtner, H Bos
Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013
332013
The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
A Slowinska, H Bos
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
302007
Scalable data structure detection and classification for C/C++ binaries
I Haller, A Slowinska, H Bos
Empirical Software Engineering 21, 778-810, 2016
242016
On the detection of custom memory allocators in C binaries
X Chen, A Slowinska, H Bos
Empirical Software Engineering 21, 753-777, 2016
212016
System-level support for intrusion recovery
A Bacs, R Vermeulen, A Slowinska, H Bos
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
172013
DDE: dynamic data structure excavation
A Slowinska, T Stancescu, H Bos
Proceedings of the first ACM asia-pacific workshop on Workshop on systems, 13-18, 2010
162010
The system can't perform the operation now. Try again later.
Articles 1–20