Yan Shoshitaishvili

Orcid: 0000-0001-8832-1789

According to our database1, Yan Shoshitaishvili authored at least 79 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software.
CoRR, 2024

The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning.
CoRR, 2024

TYGR: Type Inference on Stripped Binaries using Graph Neural Networks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation.
Proceedings of the 33rd USENIX Security Symposium, 2024

Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation.
Proceedings of the 33rd USENIX Security Symposium, 2024

"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

PWN The Learning Curve: Education-First CTF Challenges.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

DOJO: Applied Cybersecurity Education in the Browser.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024


SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Street Rep: A Privacy-Preserving Reputation Aggregation System.
IACR Cryptol. ePrint Arch., 2023

Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Proceedings of the 31st USENIX Security Symposium, 2022

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
Proceedings of the 31st USENIX Security Symposium, 2022

Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention.
Proceedings of the 31st USENIX Security Symposium, 2022

"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Context-Auditor: Context-sensitive Content Injection Mitigation.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Hybrid Pruning: Towards Precise Pointer and Taint Analysis.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ViK: practical mitigation of temporal memory safety violations through object ID inspection.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020

Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Exploring Abstraction Functions in Fuzzing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Sleak: automating address space layout derandomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Mechanical Phish: Resilient Autonomous Hacking.
IEEE Secur. Priv., 2018

HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
Proceedings of the 27th USENIX Security Symposium, 2018

T-Fuzz: Fuzzing by Program Transformation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

A Binary Analysis Approach to Retrofit Security in Input Parsing Routines.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Challenges and Preparedness of SDN-based Firewalls.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

CacheLight: Defeating the CacheKit Attack.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Building a Base for Cyber-autonomy.
PhD thesis, 2017

BootStomp: On the Security of Bootloaders in Mobile Devices.
Proceedings of the 26th USENIX Security Symposium, 2017

Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Angr - The Next Generation of Binary Analysis.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

Ramblr: Making Reassembly Great Again.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Piston: Uncooperative Remote Runtime Patching.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Driller: Augmenting Fuzzing Through Selective Symbolic Execution.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Portrait of a Privacy Invasion.
Proc. Priv. Enhancing Technol., 2015

How the ELF Ruined Christmas.
Proceedings of the 24th USENIX Security Symposium, 2015

Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Ten Years of iCTF: The Good, The Bad, and The Ugly.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security.
Proceedings of the Symposium on Applied Computing, 2014

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

PExy: The Other Side of Exploit Kits.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Blacksheep: detecting compromised hosts in homogeneous crowds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...