Asia Slowinska

According to our database1, Asia Slowinska authored at least 24 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Compiler-Agnostic Function Detection in Binaries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Scalable data structure detection and classification for C/C++ binaries.
Empir. Softw. Eng., 2016

On the detection of custom memory allocators in C binaries.
Empir. Softw. Eng., 2016

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Practical Context-Sensitive CFI.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities.
login Usenix Mag., 2013

MemPick: A tool for data structure detection.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

MemPick: High-level data structure detection in C/C++ binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

MemBrush: A practical tool to detect custom memory allocators in C binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Who allocated my memory? Detecting custom memory allocators in C binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

System-Level Support for Intrusion Recovery.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Minemu: The World's Fastest Taint Tracker.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
Pointer tainting still pointless: (but we all see the point of tainting).
ACM SIGOPS Oper. Syst. Rev., 2010

DDE: dynamic data structure excavation.
Proceedings of the 1st ACM SIGCOMM Asia-Pacific Workshop on Systems, 2010

2009
Pointless tainting?: evaluating the practicality of pointer tainting.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

2007
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
SafeCard: A Gigabit IPS on the Network Card.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006


  Loading...