Följ
Vishwath Mohan
Vishwath Mohan
Android Security, Google
Verifierad e-postadress på google.com - Startsida
Titel
Citeras av
Citeras av
År
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5032012
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2512015
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1342020
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1142012
Exploiting an antivirus interface
KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham
Computer Standards & Interfaces 31 (6), 1182-1189, 2009
522009
Frankenstein: Stitching Malware from Benign Binaries.
V Mohan, KW Hamlen
WOOT 12, 77-84, 2012
482012
Reining in Windows API abuses with in-lined reference monitors
KW Hamlen, V Mohan, R Wartell
UTD Technical Report, UTDCS-18-10, 2010
122010
Searching for software diversity: attaining artificial diversity through program synthesis
GR Lundquist, V Mohan, KW Hamlen
Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016
112016
Frankenstein: a tale of horror and logic programming
V Mohan, KW Hamlen
Book Reviews 2, 2017
12017
Source-free binary mutation for offense and defense
VR Mohan
The University of Texas at Dallas, 2014
12014
Binary stirring
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
12012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–11