Kevin Z. Snow

Orcid: 0009-0007-3666-9880

According to our database1, Kevin Z. Snow authored at least 21 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2023
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2021
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
Proceedings of the 30th USENIX Security Symposium, 2021

Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software.
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021

2020
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR, 2019

2018
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Identifying Code Injection and Reuse Payloads In Memory Error Exploits.
PhD thesis, 2014

2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Inf. Forensics Secur., 2012

2011
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
Proceedings of the 20th USENIX Security Symposium, 2011

Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Trail of bytes: efficient support for forensic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...