Vishwath Mohan
Vishwath Mohan
Android Security, Google
Bestätigte E-Mail-Adresse bei google.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4132012
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
1802015
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
832012
Frankenstein: Stitching Malware from Benign Binaries.
V Mohan, KW Hamlen
WOOT 12, 77-84, 2012
442012
Exploiting an antivirus interface
KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham
Computer Standards & Interfaces 31 (6), 1182-1189, 2009
412009
Fuzzgen: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th {USENIX} Security Symposium ({USENIX} Security 20), 2271-2287, 2020
132020
Reining in Windows API abuses with in-lined reference monitors
KW Hamlen, V Mohan, R Wartell
UTD Technical Report, UTDCS-18-10, 2010
112010
Searching for software diversity: attaining artificial diversity through program synthesis
GR Lundquist, V Mohan, KW Hamlen
Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016
62016
Frankenstein: a tale of horror and logic programming
V Mohan, KW Hamlen
Book Reviews 2, 2017
12017
Source-free binary mutation for offense and defense
VR Mohan
The University of Texas at Dallas, 2014
12014
Source-free binary mutation...
VR Mohan
2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–11