Kevin Z. Snow
Orcid: 0009-0007-3666-9880
According to our database1,
Kevin Z. Snow
authored at least 20 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021
2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
CoRR, 2019
2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
2016
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
PhD thesis, 2014
2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Inf. Forensics Secur., 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010