Seguir
Vishwath Mohan
Vishwath Mohan
Android Security, Google
Dirección de correo verificada de google.com - Página principal
Título
Citado por
Citado por
Año
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4922012
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2412015
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1152012
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1132020
Exploiting an antivirus interface
KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham
Computer Standards & Interfaces 31 (6), 1182-1189, 2009
502009
Frankenstein: Stitching Malware from Benign Binaries.
V Mohan, KW Hamlen
WOOT 12, 77-84, 2012
482012
Reining in Windows API abuses with in-lined reference monitors
KW Hamlen, V Mohan, R Wartell
UTD Technical Report, UTDCS-18-10, 2010
122010
Searching for software diversity: attaining artificial diversity through program synthesis
GR Lundquist, V Mohan, KW Hamlen
Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016
112016
Frankenstein: a tale of horror and logic programming
V Mohan, KW Hamlen
Book Reviews 2, 2017
12017
Source-free binary mutation for offense and defense
VR Mohan
The University of Texas at Dallas, 2014
12014
Binary stirring
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
12012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–11