Pongsin Poosankam

According to our database1, Pongsin Poosankam authored at least 16 papers between 2006 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
Proceedings of the 20th USENIX Security Symposium, 2011

Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

HookScout: Proactive Binary-Centric Hook Detection.
Proceedings of the Detection of Intrusions and Malware, 2010

Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Loop-extended symbolic execution on binary programs.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
Design space and analysis of worm defense strategies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006


  Loading...