Sledovat
Sanjay Rawat
Název
Citace
Citace
Rok
VUzzer: Application-aware evolutionary fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
8682017
Toward large-scale vulnerability discovery using machine learning
G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier
Proceedings of the sixth ACM conference on data and application security and …, 2016
3342016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
2772016
KameleonFuzz: evolutionary fuzzing for black-box XSS detection
F Duchene, S Rawat, JL Richier, R Groz
Proceedings of the 4th ACM conference on Data and application security and …, 2014
1582014
Ifuzzer: An evolutionary interpreter fuzzer using genetic programming
S Veggalam, S Rawat, I Haller, H Bos
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1422016
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing
F Duchene, R Groz, S Rawat, J Richier
Software Testing, Verification and Validation Workshops (ICST), 2012 IEEE …, 2012
1062012
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security (JIAS) 1 (1), 43-50, 2006
692006
TIFF: using input type inference to improve fuzzing
V Jain, S Rawat, C Giuffrida, H Bos
Proceedings of the 34th annual computer security applications conference …, 2018
652018
Finding Buffer Overflow Inducing Loops in Binary Executables
S Rawat, L Mounier
IEEE International Conference on Software Security and Reliability (SERE …, 2012
552012
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection
F Duchene, S Rawat, JL Richier, R Groz
2013 20th Working Conference on Reverse Engineering (WCRE), 252-261, 2013
482013
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
482006
An evolutionary computing approach for hunting buffer overflow vulnerabilities: A case of aiming in dim light
S Rawat, L Mounier
2010 European Conference on Computer Network Defense, 37-45, 2010
402010
Network intrusion detection using wavelet analysis
S Rawat, CS Sastry
International Conference on Intelligent Information Technology, 224-232, 2004
342004
Offset-aware mutation based fuzzing for buffer overflow vulnerabilities: Few preliminary results
S Rawat, L Mounier
2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011
332011
Network traffic analysis using singular value decomposition and multiscale transforms
CS Sastry, S Rawat, AK Pujari, VP Gulati
Information Sciences 177 (23), 5275-5291, 2007
332007
Confuzz—a concurrency fuzzer
N Vinesh, M Sethumadhavan
First International Conference on Sustainable Technologies for Computational …, 2020
292020
A fast host-based intrusion detection system using rough set theory
S Rawat, VP Gulati, AK Pujari
Transactions on Rough Sets IV, 144-161, 2005
282005
A code centric evaluation of c/c++ vulnerability datasets for deep learning based vulnerability detection techniques
R Jain, N Gervasoni, M Ndhlovu, S Rawat
Proceedings of the 16th Innovations in Software Engineering Conference, 1-10, 2023
242023
LeanSym: Efficient hybrid fuzzing through conservative constraint debloating
X Mi, S Rawat, C Giuffrida, H Bos
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
162021
Masquerade detection using ia network
SK Dash, S Rawat, GV Kumari, AK Pujari
First International Workshop on Applications of Constraint Satisfaction and …, 2005
152005
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20