Yan Shoshitaishvili [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images CODASPY2019-2019 - Dallas, United States
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images CODASPY2019-2019 - Dallas, United States
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
All our Powers Combined: Connecting Academics, Engineers, and Hackers hitcon-2017 - taiwan,china
Achieving Cyber-autonomy cactuscon-2017 - arizonia,usa
BootStomp: On the Security of Bootloaders in Mobile Devices usenixsecurity-2017 - vancouver,canada
25 Years of Program Analysis Defcon-2017 - las vegas,usa
Cyber Grand Shellphish Defcon-2016 - las vegas,usa
Driller: Augmenting Fuzzing Through Selective Symbolic Execution NDSS-2016 - california,usa
How the ELF Ruined Christmas SecuritySymposium-2015 - washington,USA
Dark side of the ELF - leveraging dynamic loading to pwn noobs Defcon-2015 - Las vegas,usa
Angry Hacking - the next generation of binary analysis Defcon-2015 - Las vegas,usa
USING STATIC BINARY ANALYSIS TO FIND VULNERABILITIES AND BACKDOORS IN FIRMWARE BlackhatUS-2015 - Las vegas,usa
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware NDSS-2015 - san diego,usa
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Raid-2014 - gottenburg,sweden
PExy: The other side of Exploit Kits Dimva-2014 - London,UK
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware USENIX-2013 - Washington, D.C.
Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services USENIX-2013 - Washington, D.C.