VUzzer: Application-aware evolutionary fuzzing. S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos NDSS 17, 1-14, 2017 | 796 | 2017 |
Toward large-scale vulnerability discovery using machine learning G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier Proceedings of the sixth ACM conference on data and application security and …, 2016 | 311 | 2016 |
A tough call: Mitigating advanced code-reuse attacks at the binary level V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ... 2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016 | 259 | 2016 |
KameleonFuzz: evolutionary fuzzing for black-box XSS detection F Duchene, S Rawat, JL Richier, R Groz Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 148 | 2014 |
Ifuzzer: An evolutionary interpreter fuzzer using genetic programming S Veggalam, S Rawat, I Haller, H Bos Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 131 | 2016 |
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing F Duchene, R Groz, S Rawat, J Richier Software Testing, Verification and Validation Workshops (ICST), 2012 IEEE …, 2012 | 102 | 2012 |
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric S Rawat, VP Gulati, AK Pujari, VR Vemuri Journal of Information Assurance and Security (JIAS) 1 (1), 43-50, 2006 | 69 | 2006 |
TIFF: using input type inference to improve fuzzing V Jain, S Rawat, C Giuffrida, H Bos Proceedings of the 34th annual computer security applications conference …, 2018 | 56 | 2018 |
Finding Buffer Overflow Inducing Loops in Binary Executables S Rawat, L Mounier IEEE International Conference on Software Security and Reliability (SERE …, 2012 | 55 | 2012 |
On the use of singular value decomposition for a fast intrusion detection system S Rawat, AK Pujari, VP Gulati Electronic Notes in Theoretical Computer Science 142, 215-228, 2006 | 48 | 2006 |
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection F Duchene, S Rawat, JL Richier, R Groz 2013 20th Working Conference on Reverse Engineering (WCRE), 252-261, 2013 | 47 | 2013 |
An evolutionary computing approach for hunting buffer overflow vulnerabilities: A case of aiming in dim light S Rawat, L Mounier 2010 European Conference on Computer Network Defense, 37-45, 2010 | 38 | 2010 |
Offset-aware mutation based fuzzing for buffer overflow vulnerabilities: Few preliminary results S Rawat, L Mounier 2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011 | 33 | 2011 |
Network intrusion detection using wavelet analysis S Rawat, CS Sastry Intelligent Information Technology: 7th International Conference on …, 2005 | 33 | 2005 |
Network traffic analysis using singular value decomposition and multiscale transforms CS Sastry, S Rawat, AK Pujari, VP Gulati Information Sciences 177 (23), 5275-5291, 2007 | 32 | 2007 |
A fast host-based intrusion detection system using rough set theory S Rawat, VP Gulati, AK Pujari Transactions on Rough Sets IV, 144-161, 2005 | 28 | 2005 |
Confuzz—a concurrency fuzzer N Vinesh, M Sethumadhavan First International Conference on Sustainable Technologies for Computational …, 2020 | 27 | 2020 |
Danger theory based SYN flood attack detection in autonomic network S Rawat, A Saxena Proceedings of the 2nd international conference on Security of information …, 2009 | 14 | 2009 |
Masquerade detection using ia network SK Dash, S Rawat, GV Kumari, AK Pujari First International Workshop on Applications of Constraint Satisfaction and …, 2005 | 14 | 2005 |
Exniffer: Learning to prioritize crashes by assessing the exploitability from memory dump S Tripathi, G Grieco, S Rawat 2017 24th Asia-Pacific Software Engineering Conference (APSEC), 239-248, 2017 | 13 | 2017 |