The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gary Wassermann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:25-36 [Conf]
  2. Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong
    ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:66-71 [Conf]
  3. Gary Wassermann, Zhendong Su
    Validity Checking for Finite Automata over Linear Arithmetic Constraints. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2006, pp:405-416 [Conf]
  4. Zhendong Su, Gary Wassermann
    The essence of command injection attacks in web applications. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:372-382 [Conf]
  5. Gary Wassermann, Zhendong Su
    Sound and precise analysis of web applications for injection vulnerabilities. [Citation Graph (0, 0)][DBLP]
    PLDI, 2007, pp:32-41 [Conf]
  6. Gary Wassermann, Carl Gould, Zhendong Su, Premkumar T. Devanbu
    Static checking of dynamically generated queries in database applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:4, pp:- [Journal]

  7. Static detection of cross-site scripting vulnerabilities. [Citation Graph (, )][DBLP]


  8. Dynamic test input generation for web applications. [Citation Graph (, )][DBLP]


  9. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002