Tracelet-based code search in executables Y David, E Yahav Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014 | 221 | 2014 |
Statistical similarity of binaries Y David, N Partush, E Yahav Proceedings of the 37th ACM SIGPLAN Conference on Programming Language …, 2016 | 204 | 2016 |
FirmUp: Precise static detection of common vulnerabilities in firmware Y David, N Partush, E Yahav ACM SIGPLAN Notices 53 (2), 392-404, 2018 | 147 | 2018 |
Similarity of binaries through re-optimization Y David, N Partush, E Yahav Proceedings of the 38th ACM SIGPLAN Conference on Programming Language …, 2017 | 129 | 2017 |
Neural reverse engineering of stripped binaries using augmented control flow graphs Y David, U Alon, E Yahav Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020 | 101* | 2020 |
Similarity of binaries E Yahav, NS Partush, MY David US Patent 11,188,322, 2021 | 52 | 2021 |
NeuDep: neural binary memory dependence analysis K Pei, D She, M Wang, S Geng, Z Xuan, Y David, J Yang, S Jana, B Ray Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 6 | 2022 |
{UPGRADVISOR}: Early Adopting Dependency Updates Using Hybrid Program Analysis and Hardware Tracing Y David, X Sun, RJ Sofaer, A Senthilnathan, J Yang, Z Zuo, GH Xu, J Nieh, ... 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2022 | 5 | 2022 |
QUACK: Hindering Deserialization Attacks via Static Duck Typing Y David, N Christou, AD Kellas, VP Kemerlis, J Yang the Network and Distributed System Security Symposium (NDSS), 2024 | 3 | 2024 |
Similarity in Binary Executables Y David, E Yahav Computer Science Department, Technion, 2020 | 1 | 2020 |
RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains RJ Sofaer, Y David, M Kang, J Yu, Y Cao, J Yang, J Nieh Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | | 2024 |