var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Fq%3DSlowinska%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=Slowinska&filter=keywords:type_paper,keywords:(type_tier1|type_award|type_press)&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Fq%3DSlowinska%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=Slowinska&filter=keywords:type_paper,keywords:(type_tier1|type_award|type_press)\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Fq%3DSlowinska%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=Slowinska&filter=keywords:type_paper,keywords:(type_tier1|type_award|type_press)\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Practical Data-Only Attack Generation.\n \n \n \n \n\n\n \n Johannesmeyer, B.; Slowinska, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In USENIX Security, August 2024. \n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n \n \"PracticalCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 52 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{johannesmeyer_practical_2024,\n\ttitle = {Practical {Data}-{Only} {Attack} {Generation}},\n\turl = {Paper=https://download.vusec.net/papers/einstein_sec24.pdf Code=https://github.com/vusec/einstein},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Johannesmeyer, Brian and Slowinska, Asia and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = aug,\n\tyear = {2024},\n\tkeywords = {class\\_binary, proj\\_intersect, proj\\_theseus, type\\_ae, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Compiler-Agnostic Function Detection in Binaries.\n \n \n \n \n\n\n \n Andriesse, D.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In EuroS&P, April 2017. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"Compiler-AgnosticPaper\n  \n \n \n \"Compiler-AgnosticCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 22 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{andriesse_compiler-agnostic_2017,\n\ttitle = {Compiler-{Agnostic} {Function} {Detection} in {Binaries}},\n\turl = {Paper=https://mistakenot.net/papers/eurosp-2017.pdf Code=https://github.com/vusec/nucleus},\n\tbooktitle = {{EuroS}\\&{P}},\n\tauthor = {Andriesse, Dennis and Slowinska, Asia and Bos, Herbert},\n\tmonth = apr,\n\tyear = {2017},\n\tnote = {Best Paper Award},\n\tkeywords = {class\\_binary, class\\_reveng, disassembly, type\\_award, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.\n \n \n \n \n\n\n \n Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n \n \"AnWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{andriesse_-depth_2016,\n\ttitle = {An {In}-{Depth} {Analysis} of {Disassembly} on {Full}-{Scale} x86/x64 {Binaries}},\n\turl = {Paper=https://syssec.mistakenot.net/papers/sec-2016.pdf Web=https://www.vusec.net/projects/disassembly},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Andriesse, Dennis and Chen, Xi and van der Veen, Victor and Slowinska, Asia and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tkeywords = {class\\_binary, disassembly, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Practical Context-Sensitive CFI.\n \n \n \n \n\n\n \n van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In CCS, November 2015. \n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n \n \"PracticalWeb\n  \n \n \n \"PracticalCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 101 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_practical_2015,\n\ttitle = {Practical {Context}-{Sensitive} {CFI}},\n\turl = {Paper=http://www.cs.vu.nl/~giuffrida/papers/ccs-2015.pdf Web=https://www.vusec.net/projects/patharmor Code=https://github.com/vusec/patharmor},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Andriesse, Dennis and Göktas, Enes and Gras, Ben and Sambuc, Lionel and Slowinska, Asia and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = nov,\n\tyear = {2015},\n\tkeywords = {class\\_armor, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries.\n \n \n \n \n\n\n \n Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In NDSS, November 2015. \n \n\n\n\n
\n\n\n\n \n \n \"StackArmor:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{chen_stackarmor_2015,\n\ttitle = {{StackArmor}: {Comprehensive} {Protection} from {Stack}-based {Memory} {Error} {Vulnerabilities} for {Binaries}},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/ndss-2015.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Chen, Xi and Slowinska, Asia and Andriesse, Dennis and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = nov,\n\tyear = {2015},\n\tkeywords = {class\\_armor, class\\_rand, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.\n \n \n \n \n\n\n \n Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H.\n\n\n \n\n\n\n In USENIX Security, December 2013. \n \n\n\n\n
\n\n\n\n \n \n \"DowsingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{haller_dowsing_2013,\n\ttitle = {Dowsing for {Overflows}: {A} {Guided} {Fuzzer} to {Find} {Buffer} {Boundary} {Violations}},\n\turl = {http://www.cs.vu.nl/%7Eherbertb/papers/dowser_usenixsec13.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Haller, Istvan and Slowinska, Asia and Neugschwandtner, Matthias and Bos, Herbert},\n\tmonth = dec,\n\tyear = {2013},\n\tkeywords = {class\\_testing, type\\_conf, type\\_csec, type\\_mscthesis, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries.\n \n \n \n \n\n\n \n Chen, X.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In WCRE, September 2013. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"WhoPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{chen_who_2013,\n\ttitle = {Who {Allocated} {My} {Memory}? {Detecting} {Custom} {Memory} {Allocators} in {C} {Binaries}},\n\turl = {http://www.cs.vu.nl/~herbertb/papers/membrush_wcre13.pdf},\n\tbooktitle = {{WCRE}},\n\tauthor = {Chen, Xi and Slowinska, Asia and Bos, Herbert},\n\tmonth = sep,\n\tyear = {2013},\n\tnote = {Best Paper Award},\n\tkeywords = {class\\_reveng, type\\_award, type\\_conf, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Howard: A Dynamic Excavator for Reverse Engineering Data Structures.\n \n \n \n \n\n\n \n Slowinska, A.; Stancescu, T.; and Bos, H.\n\n\n \n\n\n\n In NDSS, November 2011. \n \n\n\n\n
\n\n\n\n \n \n \"Howard:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{slowinska_howard_2011,\n\ttitle = {Howard: {A} {Dynamic} {Excavator} for {Reverse} {Engineering} {Data} {Structures}},\n\turl = {http://www.cs.vu.nl/~herbertb/papers/dde_ndss11-preprint.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Slowinska, Asia and Stancescu, Traian and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2011},\n\tkeywords = {class\\_reveng, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Pointless Tainting? Evaluating the Practicality of Pointer Tainting.\n \n \n \n \n\n\n \n Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In EuroSys, December 2009. \n \n\n\n\n
\n\n\n\n \n \n \"PointlessPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{slowinska_pointless_2009,\n\ttitle = {Pointless {Tainting}? {Evaluating} the {Practicality} of {Pointer} {Tainting}},\n\turl = {http://www.cs.vu.nl/~herbertb/papers/pointless_eurosys09.pdf},\n\tbooktitle = {{EuroSys}},\n\tauthor = {Slowinska, Asia and Bos, Herbert},\n\tmonth = dec,\n\tyear = {2009},\n\tkeywords = {class\\_binary, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Argos: an Emulator for Fingerprinting Zero-Day Attacks.\n \n \n \n \n\n\n \n Portokalidis, G.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In EuroSys, December 2006. \n \n\n\n\n
\n\n\n\n \n \n \"Argos:Paper\n  \n \n \n \"Argos:Web\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{portokalidis_argos_2006,\n\ttitle = {Argos: an {Emulator} for {Fingerprinting} {Zero}-{Day} {Attacks}},\n\turl = {Paper=http://www.cs.vu.nl/~herbertb/papers/argos_eurosys06.pdf Web=http://www.few.vu.nl/argos},\n\tbooktitle = {{EuroSys}},\n\tauthor = {Portokalidis, Georgios and Slowinska, Asia and Bos, Herbert},\n\tmonth = dec,\n\tyear = {2006},\n\tkeywords = {class\\_binary, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);