Josselin Feist

According to our database1, Josselin Feist authored at least 12 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Evaluating and Improving Static Analysis Tools Via Differential Mutation Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Echidna: effective, usable, and fast fuzzing for smart contracts.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Slither: a static analysis framework for smart contracts.
Proceedings of the 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, 2019

2017
Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free. (Analyses de code binaire pour la détection et le déclenchement de use-after-free).
PhD thesis, 2017

2016
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information.
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016

Specification of concretization and symbolization policies in symbolic execution.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Toward Large-Scale Vulnerability Discovery using Machine Learning.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2014
Statically detecting use after free on binary code.
J. Comput. Virol. Hacking Tech., 2014


  Loading...