フォロー
Vishwath Mohan
Vishwath Mohan
Android Security, Google
確認したメール アドレス: google.com - ホームページ
タイトル
引用先
引用先
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4972012
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2522015
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1472020
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1152012
Exploiting an antivirus interface
KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham
Computer Standards & Interfaces 31 (6), 1182-1189, 2009
562009
Frankenstein: Stitching Malware from Benign Binaries.
V Mohan, KW Hamlen
WOOT 12, 77-84, 2012
522012
Searching for software diversity: attaining artificial diversity through program synthesis
GR Lundquist, V Mohan, KW Hamlen
Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016
132016
Reining in Windows API abuses with in-lined reference monitors
KW Hamlen, V Mohan, R Wartell
UTD Technical Report, UTDCS-18-10, 2010
132010
Frankenstein: a tale of horror and logic programming
V Mohan, KW Hamlen
Book Reviews 2, 2017
12017
Source-free binary mutation for offense and defense
VR Mohan
The University of Texas at Dallas, 2014
12014
Binary stirring
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
12012
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–11