Behnaz Hassanshahi

Orcid: 0009-0006-6639-3056

According to our database1, Behnaz Hassanshahi authored at least 23 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds.
CoRR, 2024

BinEq - A Benchmark of Compiled Java Programs to Assess Alternative Builds.
Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2024

2023
The role of program analysis in security vulnerability detection: Then and now.
Comput. Secur., December, 2023

Macaron: A Logic-based Framework for Software Supply Chain Security Assurance.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

2022
Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs (Artifact).
Dagstuhl Artifacts Ser., 2022

Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs (Extended Version).
CoRR, 2022

Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Experience: Model-Based, Feedback-Driven, Greybox Web Fuzzing with BackREST.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

Automatic Root Cause Quantification for Missing Edges in JavaScript Call Graphs.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

2021
BackREST: A Model-Based Feedback-Driven Greybox Fuzzer for Web Applications.
CoRR, 2021

MoScan: a model-based vulnerability scanner for web single sign-on services.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2020
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications.
CoRR, 2020

Coding Practices and Recommendations of Spring Security for Enterprise Applications.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Trade-offs in managing risk and technical debt in industrial research labs: an experience report.
Proceedings of the TechDebt '20: International Conference on Technical Debt, 2020

2019
Nodest: feedback-driven static analysis of Node.js applications.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation.
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, 2019

2018
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation.
CoRR, 2018

AFFOGATO: runtime detection of injection attacks for Node.js.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

2017
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication.
Comput. Secur., 2017

An efficient tunable selective points-to analysis for large codebases.
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2017

Android Database Attacks Revisited.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Web-to-Application Injection Attacks on Android: Characterization and Detection.
Proceedings of the Computer Security - ESORICS 2015, 2015

2013
JNICodejail: native code isolation for Java programs.
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013


  Loading...