Sean Heelan
Sean Heelan
Geverifieerd e-mailadres voor cs.ox.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Automatic generation of control flow hijacking exploits for software vulnerabilities
S Heelan
University of Oxford, 2009
682009
Vulnerability detection systems: Think cyborg, not robot
S Heelan
IEEE Security and Privacy 9 (3), 74-77, 2011
412011
SMT Solvers in Software Security.
J Vanegue, S Heelan, R Rolles
WOOT 12, 9-22, 2012
402012
Automatic Heap Layout Manipulation for Exploitation
S Heelan, T Melham, D Kroening
27th USENIX Security Symposium (USENIX Security 18), 763-779, 2018
232018
Augmenting vulnerability analysis of binary code
S Heelan, A Gianni
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
122012
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters
S Heelan, T Melham, D Kroening
CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security …, 2019
62019
Evaluating manual intervention to address the challenges of bug finding with KLEE
J Galea, S Heelan, D Neville, D Kroening
arXiv preprint arXiv:1805.03450, 2018
32018
Learning Concise Models from Long Execution Traces
S Heelan, T Melham, D Kroening, T Melham, S Heelan, T Melham, ...
57th {ACM/IEEE} Design Automation Conference,{DAC} 2020, San Francisco 8254 …, 2016
2016
Greybox Automatic Exploit Generation for Heap Overflows in Language Interpreters
S Heelan
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9