Sanjay Rawat

Orcid: 0000-0003-0875-7924

Affiliations:
  • University of Bristol, UK
  • Vrije Universiteit Amsterdam, The Netherlands (2015 - 2018)
  • IIIT Hyderabad, India (2014 - 2015)
  • Politechnic Institute of Grenoble, France (2012 - 2013)
  • Verimag, Gières, France (2009 - 2011)
  • University of Hyderabad, India (PhD 2005)


According to our database1, Sanjay Rawat authored at least 30 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Code Centric Evaluation of C/C++ Vulnerability Datasets for Deep Learning Based Vulnerability Detection Techniques.
Proceedings of the 16th Innovations in Software Engineering Conference, 2023

2021
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2018
TIFF: Using Input Type Inference To Improve Fuzzing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Now You See Me: Real-time Dynamic Function Call Detection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
VUzzer: Application-aware Evolutionary Fuzzing.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
Binary Rejuvenation: Applications and Challenges.
IEEE Secur. Priv., 2016

Discovering Vulnerable Functions: A Code Similarity Based Approach.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach.
Proceedings of the Information Systems Security - 12th International Conference, 2016

IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming.
Proceedings of the Computer Security - ESORICS 2016, 2016

Toward Large-Scale Vulnerability Discovery using Machine Learning.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2014
Category Based Malware Detection for Android.
Proceedings of the Security in Computing and Communications, 2014

KameleonFuzz: evolutionary fuzzing for black-box XSS detection.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Combining Static and Dynamic Analysis for Vulnerability Detection
CoRR, 2013

LigRE: Reverse-engineering of control and data flow models for black-box XSS detection.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

A Stack Model for Symbolic Buffer Overflow Exploitability Analysis.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Evolving indigestible codes: Fuzzing interpreters with genetic programming.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

2012
Finding Buffer Overflow Inducing Loops in Binary Executables.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2009
Application security code analysis: a step towards software assurance.
Int. J. Inf. Comput. Secur., 2009

Danger theory based SYN flood attack detection in autonomic network.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2007
Network traffic analysis using singular value decomposition and multiscale transforms.
Inf. Sci., 2007

Use of Dimensionality Reduction for Intrusion Detection.
Proceedings of the Information Systems Security, Third International Conference, 2007

2005
A Fast Host-Based Intrusion Detection System Using Rough Set Theory.
Trans. Rough Sets, 2005

2004
Frequency- and ordering-based similarity measure for host-based intrusion detection.
Inf. Manag. Comput. Secur., 2004

On the Use of Singular Value Decomposition for a Fast Intrusion Detection System.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Network Intrusion Detection Using Wavelet Analysis.
Proceedings of the Intelligent Information Technology, 2004


  Loading...