Fabian Yamaguchi

According to our database1, Fabian Yamaguchi authored at least 26 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Learning Type Inference for Enhanced Dataflow Analysis.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2018
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Pattern-based methods for vulnerability discovery.
it Inf. Technol., 2017

64-Bit Migration Vulnerabilities.
it Inf. Technol., 2017

Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Static Program Analysis as a Fuzzing Aid.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Die Codeanalyseplattform "Octopus".
Datenschutz und Datensicherheit, 2016

From Malware Signatures to Anti-Virus Assisted Attacks.
CoRR, 2016

Comprehensive Analysis and Detection of Flash-Based Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Towards Vulnerability Discovery Using Staged Program Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Pattern-Based Vulnerability Discovery.
PhD thesis, 2015

De-anonymizing Programmers via Code Stylometry.
Proceedings of the 24th USENIX Security Symposium, 2015

Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2015

VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Modeling and Discovering Vulnerabilities with Code Property Graphs.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Chucky: exposing missing checks in source code for vulnerability discovery.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Structural detection of android malware using embedded call graphs.
Proceedings of the AISec'13, 2013

2012
Generalized vulnerability extrapolation using abstract syntax trees.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011


  Loading...