Kevin Z. Snow

Orcid: 0009-0007-3666-9880

According to our database1, Kevin Z. Snow authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2021
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
Proceedings of the 30th USENIX Security Symposium, 2021

Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

2020
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR, 2019

2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Identifying Code Injection and Reuse Payloads In Memory Error Exploits.
PhD thesis, 2014

2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Inf. Forensics Secur., 2012

2011
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Proceedings of the 20th USENIX Security Symposium, 2011

Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Trail of bytes: efficient support for forensic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...