Name
Affiliation
Papers
YAN SHOSHITAISHVILI
UC Santa Barbara, Santa Barbara, USA
46
Collaborators
Citations 
PageRank 
111
358
26.98
Referers 
Referees 
References 
1004
798
352
Search Limit
1001000
Title
Citations
PageRank
Year
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers00.342022
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability00.342022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing00.342022
Hybrid Pruning: Towards Precise Pointer and Taint Analysis00.342022
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs00.342022
Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention00.342022
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing10.382021
Favocado: Fuzzing The Binding Code Of Javascript Engines Using Semantically Correct Test Cases10.352021
Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)00.342021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service00.342021
Scam Pandemic: How Attackers Exploit Public Fear through Phishing20.392020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.00.342020
Exploring Abstraction Functions in Fuzzing00.342020
HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems50.462020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture00.342020
Karonte: Detecting Insecure Multi-binary Interactions in Embedded Firmware50.442020
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.00.342019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues40.452019
Sleak: automating address space layout derandomization10.382019
Mechanical Phish: Resilient Autonomous Hacking.20.392018
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.10.352018
CacheLight: Defeating the CacheKit Attack.00.342018
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.00.342018
A Binary Analysis Approach to Retrofit Security in Input Parsing Routines10.362018
Challenges and Preparedness of SDN-based Firewalls.00.342018
T-Fuzz: Fuzzing by Program Transformation200.682018
FEAST'18 - 2018 Workshop on Forming an Ecosystem around Software Transformation.00.342018
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games00.342017
Piston: Uncooperative Remote Runtime Patching.10.392017
Ramblr: Making Reassembly Great Again.90.492017
Bootstomp: On The Security Of Bootloaders In Mobile Devices40.512017
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.50.432017
Angr - The Next Generation of Binary Analysis.00.342017
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.200.902017
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits80.762017
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.641.822016
Driller: Augmenting Fuzzing Through Selective Symbolic Execution.932.702016
Portrait of a Privacy Invasion30.392015
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.523.332015
How the ELF Ruined Christmas40.402015
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.30.412014
Ten Years of iCTF: The Good, The Bad, and The Ugly.151.392014
Pexy: The Other Side Of Exploit Kits70.462014
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security40.722014
Steal this movie - automatically bypassing DRM protection in streaming media services90.572013
Blacksheep: detecting compromised hosts in homogeneous crowds140.632012