default search action
Sanjay Rawat 0001
Person information
- affiliation: University of Bristol, UK
- affiliation (2015 - 2018): Vrije Universiteit Amsterdam, The Netherlands
- affiliation (2014 - 2015): IIIT Hyderabad, India
- affiliation (2012 - 2013): Politechnic Institute of Grenoble, France
- affiliation (2009 - 2011): Verimag, Gières, France
- affiliation (PhD 2005): University of Hyderabad, India
Other persons with the same name
- Sanjay Rawat 0002 — Department of Mathematics, Indian Institute of Technology, Roorkee, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Ridhi Jain, Nicole Gervasoni, Mthandazo Ndhlovu, Sanjay Rawat:
A Code Centric Evaluation of C/C++ Vulnerability Datasets for Deep Learning Based Vulnerability Detection Techniques. ISEC 2023: 6:1-6:10 - [e1]Anisur Rahaman Molla, Gokarna Sharma, Pradeep Kumar, Sanjay Rawat:
Distributed Computing and Intelligent Technology - 19th International Conference, ICDCIT 2023, Bhubaneswar, India, January 18-22, 2023, Proceedings. Lecture Notes in Computer Science 13776, Springer 2023, ISBN 978-3-031-24847-4 [contents] - 2021
- [c23]Xianya Mi, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. RAID 2021: 62-77
2010 – 2019
- 2018
- [c22]Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
TIFF: Using Input Type Inference To Improve Fuzzing. ACSAC 2018: 505-517 - [c21]Franck de Goër, Sanjay Rawat, Dennis Andriesse, Herbert Bos, Roland Groz:
Now You See Me: Real-time Dynamic Function Call Detection. ACSAC 2018: 618-628 - 2017
- [c20]Shubham Tripathi, Gustavo Grieco, Sanjay Rawat:
Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump. APSEC 2017: 239-248 - [c19]Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos:
VUzzer: Application-aware Evolutionary Fuzzing. NDSS 2017 - 2016
- [j5]Angelos Oikonomopoulos, Cristiano Giuffrida, Sanjay Rawat, Herbert Bos:
Binary Rejuvenation: Applications and Challenges. IEEE Secur. Priv. 14(1): 68-71 (2016) - [c18]Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier:
Toward Large-Scale Vulnerability Discovery using Machine Learning. CODASPY 2016: 85-96 - [c17]Spandan Veggalam, Sanjay Rawat, István Haller, Herbert Bos:
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. ESORICS (1) 2016: 581-601 - [c16]Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. ICISS 2016: 532-542 - [c15]Victor van der Veen, Enes Göktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida:
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. IEEE Symposium on Security and Privacy 2016: 934-953 - [c14]Aditya Chandran, Lokesh Jain, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions: A Code Similarity Based Approach. SSCC 2016: 390-402 - 2014
- [c13]Sanjay Rawat, Laurent Mounier, Marie-Laure Potet:
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. ARES 2014: 498-505 - [c12]Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz:
KameleonFuzz: evolutionary fuzzing for black-box XSS detection. CODASPY 2014: 37-48 - [c11]Vijayendra Grampurohit, Vijay Kumar, Sanjay Rawat, Shatrunjay Rawat:
Category Based Malware Detection for Android. SSCC 2014: 239-249 - 2013
- [c10]Sanjay Rawat, Fabien Duchene, Roland Groz, Jean-Luc Richier:
Evolving indigestible codes: Fuzzing interpreters with genetic programming. CICS 2013: 37-39 - [c9]Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat:
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. ICST Workshops 2013: 216-217 - [c8]Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz:
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection. WCRE 2013: 252-261 - [i1]Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Combining Static and Dynamic Analysis for Vulnerability Detection. CoRR abs/1305.3883 (2013) - 2012
- [c7]Fabien Duchene, Roland Groz, Sanjay Rawat, Jean-Luc Richier:
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. ICST 2012: 815-817 - [c6]Sanjay Rawat, Laurent Mounier:
Finding Buffer Overflow Inducing Loops in Binary Executables. SERE 2012: 177-186 - 2011
- [c5]Sanjay Rawat, Laurent Mounier:
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. ICST Workshops 2011: 531-533
2000 – 2009
- 2009
- [j4]Sanjay Rawat, Ashutosh Saxena:
Application security code analysis: a step towards software assurance. Int. J. Inf. Comput. Secur. 3(1): 86-110 (2009) - [c4]Sanjay Rawat, Ashutosh Saxena:
Danger theory based SYN flood attack detection in autonomic network. SIN 2009: 213-218 - 2007
- [j3]Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati:
Network traffic analysis using singular value decomposition and multiscale transforms. Inf. Sci. 177(23): 5275-5291 (2007) - [c3]Subrat Kumar Dash, Sanjay Rawat, Arun K. Pujari:
Use of Dimensionality Reduction for Intrusion Detection. ICISS 2007: 306-320 - 2005
- [j2]Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari:
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Trans. Rough Sets 4: 144-161 (2005) - 2004
- [j1]Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari:
Frequency- and ordering-based similarity measure for host-based intrusion detection. Inf. Manag. Comput. Secur. 12(5): 411-421 (2004) - [c2]Sanjay Rawat, Challa S. Sastry:
Network Intrusion Detection Using Wavelet Analysis. CIT 2004: 224-232 - [c1]Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati:
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. VODCA@FOSAD 2004: 215-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-27 22:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint