Christophe Hauser

Orcid: 0000-0001-7698-8041

According to our database1, Christophe Hauser authored at least 20 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fine-grained Coverage-based Fuzzing - RCR Report.
ACM Trans. Softw. Eng. Methodol., June, 2024

Fine-grained Coverage-based Fuzzing.
ACM Trans. Softw. Eng. Methodol., June, 2024

2023
Street Rep: A Privacy-Preserving Reputation Aggregation System.
IACR Cryptol. ePrint Arch., 2023

Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Modeling Cognitive Workload in Open-Source Communities via Simulation.
Proceedings of the Multi-Agent-Based Simulation XXIV - 24th International Workshop, 2023

2022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022

AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

NS3: Neuro-symbolic Semantic Code Search.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Bin2vec: learning representations of binary executable programs for security tasks.
Cybersecur., 2021

PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical Expression.
Proceedings of the Checkmate@CCS 2021, 2021

2020
Towards Learning Representations of Binary Executable Files for Security Tasks.
CoRR, 2020

2019
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Sleak: automating address space layout derandomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A Binary Analysis Approach to Retrofit Security in Input Parsing Routines.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2013
Intrusion detection in distributed systems, an approach based on taint marking.
Proceedings of IEEE International Conference on Communications, 2013

2012
A taint marking approach to confidentiality violation detection.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Information Flow Control for Intrusion Detection Derived from MAC Policy.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...