Follow
Fabian Yamaguchi
Fabian Yamaguchi
ShiftLeft GmbH, Stellenbosch University
Verified email at shiftleft.io - Homepage
Title
Cited by
Cited by
Year
Modeling and discovering vulnerabilities with code property graphs
F Yamaguchi, N Golde, D Arp, K Rieck
2014 IEEE Symposium on Security and Privacy, 590-604, 2014
5642014
Structural detection of android malware using embedded call graphs
H Gascon, F Yamaguchi, D Arp, K Rieck
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
3912013
Generalized vulnerability extrapolation using abstract syntax trees
F Yamaguchi, M Lottmann, K Rieck
Proceedings of the 28th annual computer security applications conference …, 2012
2572012
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
Usenix Security Symposium, 2015
2522015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2262015
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
F Yamaguchi, A Maier, H Gascon, K Rieck
Security and Privacy (SP), 2015 IEEE Symposium on, 2015
2092015
Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning
FD Garcia, G de Koning Gans, R Verdult
2032011
Chucky: Exposing missing checks in source code for vulnerability discovery
F Yamaguchi, C Wressnegger, H Gascon, K Rieck
Proceedings of the 20th ACM Conference on Computer and Communications …, 2013
1912013
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
1322015
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols
H Gascon, C Wressnegger, F Yamaguchi, D Arp, K Rieck
Security and Privacy in Communication Networks: 11th EAI International …, 2015
1182015
Efficient and flexible discovery of php application vulnerabilities
M Backes, K Rieck, M Skoruppa, B Stock, F Yamaguchi
2017 IEEE european symposium on security and privacy (EuroS&P), 334-349, 2017
752017
Automatically inferring malware signatures for anti-virus assisted attacks
C Wressnegger, K Freeman, F Yamaguchi, K Rieck
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
492017
Torben: A practical side-channel attack for deanonymizing tor communication
D Arp, F Yamaguchi, K Rieck
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
392015
Pattern-Based Vulnerability Discovery.
F Yamaguchi
University of Göttingen, 2015
382015
Comprehensive analysis and detection of flash-based malware
C Wressnegger, F Yamaguchi, D Arp, K Rieck
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
312016
Static program analysis as a fuzzing aid
B Shastry, M Leutner, T Fiebig, K Thimmaraju, F Yamaguchi, K Rieck, ...
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
302017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
B Shastry, F Maggi, F Yamaguchi, K Rieck, JP Seifert
WOOT, 2017
172017
Twice the bits, twice the trouble: Vulnerabilities induced by migrating to 64-bit platforms
C Wressnegger, F Yamaguchi, A Maier, K Rieck
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
152016
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery.
T Unruh, B Shastry, M Skoruppa, F Maggi, K Rieck, JP Seifert, ...
WOOT, 2017
142017
System and method for application security profiling
VA Ionescu, F Yamaguchi, C Conikee, M Gupta
US Patent 10,740,470, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20