Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 503 | 2012 |
Opaque Control-Flow Integrity. V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz NDSS 26, 27-30, 2015 | 251 | 2015 |
{FuzzGen}: Automatic fuzzer generation K Ispoglou, D Austin, V Mohan, M Payer 29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020 | 134 | 2020 |
Securing untrusted code via compiler-agnostic binary rewriting R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 114 | 2012 |
Exploiting an antivirus interface KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham Computer Standards & Interfaces 31 (6), 1182-1189, 2009 | 52 | 2009 |
Frankenstein: Stitching Malware from Benign Binaries. V Mohan, KW Hamlen WOOT 12, 77-84, 2012 | 48 | 2012 |
Reining in Windows API abuses with in-lined reference monitors KW Hamlen, V Mohan, R Wartell UTD Technical Report, UTDCS-18-10, 2010 | 12 | 2010 |
Searching for software diversity: attaining artificial diversity through program synthesis GR Lundquist, V Mohan, KW Hamlen Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016 | 11 | 2016 |
Frankenstein: a tale of horror and logic programming V Mohan, KW Hamlen Book Reviews 2, 2017 | 1 | 2017 |
Source-free binary mutation for offense and defense VR Mohan The University of Texas at Dallas, 2014 | 1 | 2014 |
Binary stirring R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 2012 ACM conference on Computer and communications security, 2012 | 1 | 2012 |