Vishwath Mohan

According to our database1, Vishwath Mohan authored at least 8 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Adversary Models for Mobile Device Authentication.
CoRR, 2020

FuzzGen: Automatic Fuzzer Generation.
Proceedings of the 29th USENIX Security Symposium, 2020

2016
Searching for software diversity: attaining artificial diversity through program synthesis.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

2015
Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2012
Frankenstein: Stitching Malware from Benign Binaries.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2009
Exploiting an antivirus interface.
Comput. Stand. Interfaces, 2009


  Loading...