default search action
Asia Slowinska
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida:
Practical Data-Only Attack Generation. USENIX Security Symposium 2024
2010 – 2019
- 2017
- [c20]Dennis Andriesse, Asia Slowinska, Herbert Bos:
Compiler-Agnostic Function Detection in Binaries. EuroS&P 2017: 177-189 - 2016
- [j4]Xi Chen, Asia Slowinska, Herbert Bos:
On the detection of custom memory allocators in C binaries. Empir. Softw. Eng. 21(3): 753-777 (2016) - [j3]István Haller, Asia Slowinska, Herbert Bos:
Scalable data structure detection and classification for C/C++ binaries. Empir. Softw. Eng. 21(3): 778-810 (2016) - [c19]Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos:
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. USENIX Security Symposium 2016: 583-600 - 2015
- [c18]Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida:
Practical Context-Sensitive CFI. CCS 2015: 927-940 - [c17]Dennis Andriesse, Herbert Bos, Asia Slowinska:
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. DSN 2015: 125-135 - [c16]Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. NDSS 2015 - 2014
- [c15]Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos:
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables). DIMVA 2014: 1-20 - 2013
- [j2]István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities. login Usenix Mag. 38(6) (2013) - [c14]István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. USENIX Security Symposium 2013: 49-64 - [c13]Xi Chen, Asia Slowinska, Herbert Bos:
Who allocated my memory? Detecting custom memory allocators in C binaries. WCRE 2013: 22-31 - [c12]István Haller, Asia Slowinska, Herbert Bos:
MemPick: High-level data structure detection in C/C++ binaries. WCRE 2013: 32-41 - [c11]Xi Chen, Asia Slowinska, Herbert Bos:
MemBrush: A practical tool to detect custom memory allocators in C binaries. WCRE 2013: 477-478 - [c10]István Haller, Asia Slowinska, Herbert Bos:
MemPick: A tool for data structure detection. WCRE 2013: 479-480 - 2012
- [c9]Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos:
System-Level Support for Intrusion Recovery. DIMVA 2012: 144-163 - [c8]Asia Slowinska, Traian Stancescu, Herbert Bos:
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. USENIX ATC 2012: 125-137 - 2011
- [c7]Asia Slowinska, Traian Stancescu, Herbert Bos:
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. NDSS 2011 - [c6]Erik Bosman, Asia Slowinska, Herbert Bos:
Minemu: The World's Fastest Taint Tracker. RAID 2011: 1-20 - 2010
- [j1]Asia Slowinska, Herbert Bos:
Pointer tainting still pointless: (but we all see the point of tainting). ACM SIGOPS Oper. Syst. Rev. 44(3): 88-92 (2010) - [c5]Asia Slowinska, Traian Stancescu, Herbert Bos:
DDE: dynamic data structure excavation. ApSys 2010: 13-18
2000 – 2009
- 2009
- [c4]Asia Slowinska, Herbert Bos:
Pointless tainting?: evaluating the practicality of pointer tainting. EuroSys 2009: 61-74 - 2007
- [c3]Asia Slowinska, Herbert Bos:
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. ACSAC 2007: 487-500 - 2006
- [c2]Georgios Portokalidis, Asia Slowinska, Herbert Bos:
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. EuroSys 2006: 15-27 - [c1]Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos:
SafeCard: A Gigabit IPS on the Network Card. RAID 2006: 311-330
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint