Follow
Vishwath Mohan
Title
Cited by
Cited by
Year
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4912012
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2392015
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1142012
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1102020
Exploiting an antivirus interface
KW Hamlen, V Mohan, MM Masud, L Khan, B Thuraisingham
Computer Standards & Interfaces 31 (6), 1182-1189, 2009
492009
Frankenstein: Stitching Malware from Benign Binaries.
V Mohan, KW Hamlen
WOOT 12, 77-84, 2012
482012
Reining in Windows API abuses with in-lined reference monitors
KW Hamlen, V Mohan, R Wartell
UTD Technical Report, UTDCS-18-10, 2010
122010
Searching for software diversity: attaining artificial diversity through program synthesis
GR Lundquist, V Mohan, KW Hamlen
Proceedings of the 2016 New Security Paradigms Workshop, 80-91, 2016
112016
Frankenstein: a tale of horror and logic programming
V Mohan, KW Hamlen
Book Reviews 2, 2017
12017
Source-free binary mutation for offense and defense
VR Mohan
The University of Texas at Dallas, 2014
12014
Binary stirring
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–11