Follow
Istvan Haller
Istvan Haller
Verified email at student.vu.nl
Title
Cited by
Cited by
Year
Dowsing for overflows: a guided fuzzer to find buffer boundary violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
3062013
Ifuzzer: An evolutionary interpreter fuzzer using genetic programming
S Veggalam, S Rawat, I Haller, H Bos
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
942016
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
922016
Shrinkwrap: Vtable protection without loose ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
642015
The borg: Nanoprobing binaries for buffer overreads
M Neugschwandtner, P Milani Comparetti, I Haller, H Bos
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
632015
Design of interpolation functions for subpixel-accuracy stereo-vision systems
I Haller, S Nedevschi
IEEE Transactions on image processing 21 (2), 889-898, 2011
582011
Real-time semi-global dense stereo solution with improved sub-pixel accuracy
I Haller, C Pantilie, F Oniga, S Nedevschi
2010 IEEE Intelligent Vehicles Symposium, 369-376, 2010
562010
GPU optimization of the SGM stereo algorithm
I Haller, S Nedevschi
Proceedings of the 2010 IEEE 6th International Conference on Intelligent …, 2010
432010
Real-time obstacle detection using dense stereo vision and dense optical flow
CD Pantilie, S Bota, I Haller, S Nedevschi
Proceedings of the 2010 IEEE 6th International Conference on Intelligent …, 2010
392010
Mempick: High-level data structure detection in c/c++ binaries
I Haller, A Slowinska, H Bos
2013 20th Working Conference on Reverse Engineering (WCRE), 32-41, 2013
322013
Dowser: a guided fuzzer to find buffer overflow vulnerabilities
I Haller, A Slowinska, M Neugschwandtner, H Bos
Proceedings of the 22nd USENIX Security Symposium, 49-64, 2013
292013
Scalable data structure detection and classification for C/C++ binaries
I Haller, A Slowinska, H Bos
Empirical Software Engineering 21, 778-810, 2016
222016
FPGA based TRNG using automatic calibration
H Istvan, A Suciu, O Cret
2009 IEEE 5th International Conference on Intelligent Computer Communication …, 2009
222009
METAlloc: Efficient and comprehensive metadata management for software security hardening
I Haller, E Van Der Kouwe, C Giuffrida, H Bos
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
212016
High-speed clock recovery for low-cost FPGAs
I Haller, ZF Baruch
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
92010
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables)
A Slowinska, I Haller, A Bacs, S Baranga, H Bos
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
72014
Statistical method for sub-pixel interpolation function estimation
I Haller, C Pantilie, T Mariţa, S Nedevschi
13th International IEEE Conference on Intelligent Transportation Systems …, 2010
72010
Real-time image rectification and stereo reconstruction system on the gpu
CD Pantilie, I Haller, M Drulea, S Nedevschi
2011 10th International Symposium on Parallel and Distributed Computing, 79-85, 2011
62011
A secret-free hypervisor: Rethinking isolation in the age of speculative vulnerabilities
H Xia, D Zhang, W Liu, I Haller, B Sherwin, D Chisnall
2022 IEEE Symposium on Security and Privacy (SP), 370-385, 2022
52022
Dowser: A guided fuzzer for finding buffer overflow vulnerabilities
I Haller, A Slowinska, M Neugschwandtner, H Bos
; login:: the magazine of USENIX & SAGE 38 (6), 16-19, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20