2018 - A. Caliskan, F. Yamaguchi, E. Dauber,
R. Harang, K. Rieck, R. Greenstadt, and A. Narayanan, When Coding
Style Survices Compilation: De-anonymizing Programmers from
Executable Binaries (NDSS)
2017 - B. Shastry, M. Leutner, T. Fiebig, K. Thimmaraju,
F. Yamaguchi, K. Rieck, S. Schmid, J.P. Seifert,
A. Feldmann, Static Program Analysis as a Fuzzing Aid (RAID)
2017 - T. Unruh, B. Shastry, M. Skoruppa, F. Maggi, K. Rieck,
J.P. Seifert, and F. Yamaguchi, Leveraging Flawed Tutorials
for Seeding Large-Scale Web Vulnerability Discovery (WOOT)
2017 - B. Shastry, F. Maggi, F. Yamaguchi,
K. Rieck, and J.P. Seifert, Static Exploration of
Taint-Style Vulnerabilities Found by Fuzzing (WOOT)
2017 - M. Backes, K. Rieck, M. Skoruppa, B. Stock, and
F. Yamaguchi, Efficient and Flexible Discovery of PHP
Application Vulnerabilities (Euro S&P)
2017 - C. Wressnegger, K. Freeman, F. Yamaguchi, and
K. Rieck, Automatically Inferring Malware Signatures for
Anti-Virus Assisted Attacks (ASIACCS)
2016 - C. Wressnegger, F. Yamaguchi, A. Maier, and
K. Rieck, Twice the Bits, Twice the Trouble: Vulnerabilities Induced
by Migrating to 64-bit Platforms , Proc. of the 23rd ACM Conference on
Computer and Communications Security (CCS)
2016 - C. Wressnegger, F. Yamaguchi, D.
Arp and K. Rieck, Comprehensive Analysis and Detection of
Flash-based Malware , Proc. of 13th Conference on Detection of
Intrusions and Malware & Vulnerability (DIMVA), Best Paper Award
2016 - B. Shastry, F. Yamaguchi, K. Rieck and
J.-P. Seifert, Towards Vulnerability Discovery Using Staged
Program Analysis , Proc. of 13th Conference on Detection of
Intrusions and Malware & Vulnerability (DIMVA)
2015 - F. Yamaguchi, A. Maier, H. Gascon, and K. Rieck,
Automatic Inference of Search Patterns for Taint-Style
Vulnerabilities , Proc. of the 36th IEEE Symposium on Security and
Privacy (S&P)
2015 - A. Caliskan-Islam, R. Harang, A. Liu, A. Narayanan,
C. Voss, F. Yamaguchi, R. Greenstadt,
De-anonymizing Programmers via Code Stylometry , Proc. of the 24th
USENIX Security Symposium (USENIX SEC)
2015 - H. Gascon, C. Wressnegger, F. Yamaguchi,
D. Arp, K. Rieck, Pulsar: Stateful Black-Box Fuzzing for Proprietary
Network Protocols , Proc. of the 11th International Conference on
Security and Privacy in Communication Networks (SECURECOMM)
2015 - H. Perl, D. Arp, S. Dechand, S. Fahl, Y. Acar,
F. Yamaguchi, R. Rieck, and M. Smith, VCCFinder: Finding
Potential Vulnerabilities in Open-Source Projects to Assist Code
Audits , Proc. of the 22nd ACM Conference on Computer and
Communications Security (CCS)
2015 - D. Arp, F. Yamaguchi, and K. Rieck, Torben: A
Practical Side-Channel Attack for Deanonymizing Tor Communication ,
Proc. of the 10th ACM Symposium on Information, Computer and
Communications Security (ASIACCS)
2014 - F. Yamaguchi, N. Golde, D. Arp, and K. Rieck,
Modeling and Discovering Vulnerabilities with Code Property Graphs ,
Proc. of the 35th IEEE Symposium on Security and Privacy (S&P)
2013 - F. Yamaguchi, C. Wressnegger, H. Gascon,
and K. Rieck, Chucky: Exposing Missing Checks in Source Code for
Vulnerability Discovery , Proc. of the 20th ACM Conference on Computer
and Communications Security (CCS)
2013 - H. Gascon, F. Yamaguchi, D. Arp, and
K. Rieck, Structural Detection of Android Malware using Embedded
Call Graphs , Proc. of the 6'th ACM Workshop on Security and
Artificial Intelligence (AISEC)
2012 - F. Yamaguchi, M. Lottmann, and K. Rieck,
Generalized Vulnerability Extrapolation using Abstract Syntax Trees ,
Proc. of the 28th Annual Computer Security Applications Conference
(ACSAC), Outstanding Paper Award
2011 - F. Yamaguchi, F. Lindner, and K. Rieck,
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities
using Machine Learning , Proc. of 5th USENIX Workshop on Offensive
Technologies (WOOT)