Yan Shoshitaishvili
Arizona State University
H-index: 28
North America-United States
Top articles of Yan Shoshitaishvili
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
“Len or index or count, anything but v1”: Predicting Variable Names in Decompilation Output with Transfer Learning | Kuntal Kumar Pal Ati Priya Bajaj Pratyay Banerjee Audrey Dutcher Mutsumi Nakamura | 2024/5 | |
Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation | 33st USENIX Security Symposium (USENIX Security 24) | Zion Leonahenahe Basque Ati Priya Bajaj Wil Gibbs Jude O’Kain Derron Miao | 2024/8 |
PWN The Learning Curve: Education-First CTF Challenges | Connor Nelson Yan Shoshitaishvili | 2024/3/7 | |
DOJO: Applied Cybersecurity Education in the Browser | Connor Nelson Yan Shoshitaishvili | 2024/3/7 | |
{AutoFR}: Automated Filter Rule Generation for Adblocking | Hieu Le Jamie Hayes Salma Elmalaki Milad Nasr Athina Markopoulou | 2023 | |
angr: A Powerful and User-friendly Binary Analysis Platform | Yan Shoshitaishvili Ruoyu Wang Audrey Dutcher Christopher Kruegel Giovanni Vigna | 2023 | |
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections | Kyle Zeng Zhenpeng Lin Kangjie Lu Xinyu Xing Ruoyu Wang | 2023/11/15 | |
Street Rep: A Privacy-Preserving Reputation Aggregation System | Cryptology ePrint Archive | Christophe Hauser Shirin Nilizadeh Yan Shoshitaishvili Ni Trieu Srivatsan Ravi | 2023 |
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer | Jaejong Baek Pradeep Kumar Duraisamy Soundrapandian Sukwha Kyung Ruoyu Wang Yan Shoshitaishvili | 2023/6/27 | |
Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation | Hui Jun Tay Kyle Zeng Jayakrishna Menon Vadayath Arvind S Raj Audrey Dutcher | 2023 | |
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale | Marzieh Bitaab Haehyun Cho Adam Oest Zhuoer Lyu Wei Wang | 2023/5/21 | |
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities | Erik Trickel Fabio Pagani Chang Zhu Lukas Dresel Giovanni Vigna | 2023/5/21 | |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang Zhibo Sun Sukwha Kyung Hans Walter Behrens Zion Leonahenahe Basque | 2022/11/7 | |
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs | Jayakrishna Vadayath Moritz Eckert Kyle Zeng Nicolaas Weideman Gokulkrishna Praveen Menon | 2022 | |
Context-auditor: Context-sensitive content injection mitigation | Faezeh Kalantari Mehrnoosh Zaeifi Tiffany Bao Ruoyu Wang Yan Shoshitaishvili | 2022/10/26 | |
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability | Kyle Zeng Yueqi Chen Haehyun Cho Xinyu Xing Adam Doupé | 2022 | |
Hybrid Pruning: Towards Precise Pointer and Taint Analysis | Dipanjan Das Priyanka Bose Aravind Machiry Sebastiano Mariani Yan Shoshitaishvili | 2022/6/24 | |
Unleash the simulacrum: shifting browser realities for robust {Extension-Fingerprinting} prevention | Soroush Karami Faezeh Kalantari Mehrnoosh Zaeifi Xavier J Maso Erik Trickel | 2022 | |
The Convergence of Source Code and Binary Vulnerability Discovery--A Case Study | Alessandro Mantovani Luca Compagna Yan Shoshitaishvili Davide Balzarotti | 2022/5/30 | |
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers | Ananta Soneji Faris Bugra Kokulu Carlos Rubio-Medrano Tiffany Bao Ruoyu Wang | 2022/5/22 |