Hugo Gascon

According to our database1, Hugo Gascon authored at least 12 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
TypeMiner: Recovering Types in Binary Programs Using Machine Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Mining Attributed Graphs for Threat Intelligence.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Fingerprinting Mobile Devices Using Personalized Configurations.
Proc. Priv. Enhancing Technol., 2016

2015
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Chucky: exposing missing checks in source code for vulnerability discovery.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Structural detection of android malware using embedded call graphs.
Proceedings of the AISec'13, 2013

2012
Learning stateful models for network honeypots.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Analysis of update delays in signature-based network intrusion detection systems.
Comput. Secur., 2011


  Loading...