Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation G Portokalidis, A Slowinska, H Bos ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006 | 503 | 2006 |
Practical context-sensitive CFI V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 349 | 2015 |
Dowsing for {Overflows}: A Guided Fuzzer to Find Buffer Boundary Violations I Haller, A Slowinska, M Neugschwandtner, H Bos 22nd USENIX Security Symposium (USENIX Security 13), 49-64, 2013 | 347 | 2013 |
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. A Slowinska, T Stancescu, H Bos NDSS, 2011 | 253 | 2011 |
An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries D Andriesse, X Chen, V Van Der Veen, A Slowinska, H Bos 25th USENIX security symposium (USENIX security 16), 583-600, 2016 | 224 | 2016 |
Pointless tainting? evaluating the practicality of pointer tainting A Slowinska, H Bos Proceedings of the 4th ACM European conference on Computer systems, 61-74, 2009 | 187 | 2009 |
Minemu: The world’s fastest taint tracker E Bosman, A Slowinska, H Bos Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 174 | 2011 |
Compiler-agnostic function detection in binaries D Andriesse, A Slowinska, H Bos 2017 IEEE European symposium on security and privacy (EuroS&P), 177-189, 2017 | 148 | 2017 |
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida NDSS, 2015 | 132 | 2015 |
Body armor for binaries: preventing buffer overflows without recompilation A Slowinski, T Stancescu, H Bos 2012 USENIX Annual Technical Conference (USENIX ATC 12), 125-137, 2012 | 70 | 2012 |
Safecard: a gigabit ips on the network card W De Bruijn, A Slowinska, K Van Reeuwijk, T Hruby, L Xu, H Bos Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 56 | 2006 |
Who allocated my memory? Detecting custom memory allocators in C binaries X Chen, A Slowinska, H Bos 2013 20th Working Conference on Reverse Engineering (WCRE), 22-31, 2013 | 42 | 2013 |
Mempick: High-level data structure detection in c/c++ binaries I Haller, A Slowinska, H Bos 2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013 | 36 | 2013 |
Parallax: Implicit code integrity verification using return-oriented programming D Andriesse, H Bos, A Slowinska 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 33 | 2015 |
Dowser: a guided fuzzer to find buffer overflow vulnerabilities I Haller, A Slowinska, M Neugschwandtner, H Bos Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013 | 33 | 2013 |
The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack A Slowinska, H Bos Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 30 | 2007 |
Scalable data structure detection and classification for C/C++ binaries I Haller, A Slowinska, H Bos Empirical Software Engineering 21, 778-810, 2016 | 24 | 2016 |
On the detection of custom memory allocators in C binaries X Chen, A Slowinska, H Bos Empirical Software Engineering 21, 753-777, 2016 | 21 | 2016 |
System-level support for intrusion recovery A Bacs, R Vermeulen, A Slowinska, H Bos Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013 | 17 | 2013 |
DDE: dynamic data structure excavation A Slowinska, T Stancescu, H Bos Proceedings of the first ACM asia-pacific workshop on Workshop on systems, 13-18, 2010 | 16 | 2010 |