Login / Signup
Kevin Z. Snow
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 14
Top Topics
Oriented Programming
Human Readable
Provenance Information
Security Risks
Top Venues
NDSS
EuroS&P
CCS
ICST
</>
Publications
</>
Kedrian James
,
Kevin Valakuzhy
,
Kevin Z. Snow
,
Fabian Monrose
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs.
CODASPY
(2024)
Yufei Du
,
Omar Alrawi
,
Kevin Z. Snow
,
Manos Antonakakis
,
Fabian Monrose
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
CCS
(2023)
Yufei Du
,
Ryan Court
,
Kevin Z. Snow
,
Fabian Monrose
Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level.
USENIX Annual Technical Conference
(2022)
Mac Malone
,
Yicheng Wang
,
Kevin Z. Snow
,
Fabian Monrose
Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software.
ICST
(2021)
Omar Alrawi
,
Charles Lever
,
Kevin Valakuzhy
,
Ryan Court
,
Kevin Z. Snow
,
Fabian Monrose
,
Manos Antonakakis
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle.
USENIX Security Symposium
(2021)
Salman Ahmed
,
Ya Xiao
,
Kevin Z. Snow
,
Gang Tan
,
Fabian Monrose
,
Danfeng (Daphne) Yao
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP.
CCS
(2020)
Md. Salman Ahmed
,
Ya Xiao
,
Gang Tan
,
Kevin Z. Snow
,
Fabian Monrose
,
Danfeng Yao
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization.
CoRR
(2019)
Micah Morton
,
Jan Werner
,
Panagiotis Kintis
,
Kevin Z. Snow
,
Manos Antonakakis
,
Michalis Polychronakis
,
Fabian Monrose
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks.
EuroS&P
(2018)
Micah Morton
,
Hyungjoon Koo
,
Forrest Li
,
Kevin Z. Snow
,
Michalis Polychronakis
,
Fabian Monrose
Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure.
ESSoS
(2017)
Roman Rogowski
,
Micah Morton
,
Forrest Li
,
Fabian Monrose
,
Kevin Z. Snow
,
Michalis Polychronakis
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
EuroS&P
(2017)
Kevin Z. Snow
,
Roman Rogowski
,
Jan Werner
,
Hyungjoon Koo
,
Fabian Monrose
,
Michalis Polychronakis
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
IEEE Symposium on Security and Privacy
(2016)
Teryl Taylor
,
Kevin Z. Snow
,
Nathan Otterness
,
Fabian Monrose
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
NDSS
(2016)
Jan Werner
,
George Baltas
,
Rob Dallara
,
Nathan Otterness
,
Kevin Z. Snow
,
Fabian Monrose
,
Michalis Polychronakis
No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
AsiaCCS
(2016)
Lucas Davi
,
Christopher Liebchen
,
Ahmad-Reza Sadeghi
,
Kevin Z. Snow
,
Fabian Monrose
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
NDSS
(2015)
Kevin Z. Snow
,
Fabian Monrose
,
Lucas Davi
,
Alexandra Dmitrienko
,
Christopher Liebchen
,
Ahmad-Reza Sadeghi
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
IEEE Symposium on Security and Privacy
(2013)
Blaine Stancill
,
Kevin Z. Snow
,
Nathan Otterness
,
Fabian Monrose
,
Lucas Davi
,
Ahmad-Reza Sadeghi
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
RAID
(2013)
Srinivas Krishnan
,
Kevin Z. Snow
,
Fabian Monrose
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches.
IEEE Trans. Inf. Forensics Secur.
7 (6) (2012)
Andrew M. White
,
Austin R. Matthews
,
Kevin Z. Snow
,
Fabian Monrose
Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
IEEE Symposium on Security and Privacy
(2011)
Kevin Z. Snow
,
Srinivas Krishnan
,
Fabian Monrose
,
Niels Provos
SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
USENIX Security Symposium
(2011)
Srinivas Krishnan
,
Kevin Z. Snow
,
Fabian Monrose
Trail of bytes: efficient support for forensic analysis.
CCS
(2010)