


default search action
Fabian Yamaguchi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Lukas Seidel
, Sedick David Baker Effendi
, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi:
Learning Type Inference for Enhanced Dataflow Analysis. ESORICS (4) 2023: 184-203 - [i5]Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi:
Learning Type Inference for Enhanced Dataflow Analysis. CoRR abs/2310.00673 (2023) - 2022
- [c20]Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi:
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. NDSS 2022
2010 – 2019
- 2018
- [c19]Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. NDSS 2018 - 2017
- [j3]Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck:
64-Bit Migration Vulnerabilities. it Inf. Technol. 59(2): 73 (2017) - [j2]Fabian Yamaguchi:
Pattern-based methods for vulnerability discovery. it Inf. Technol. 59(2): 101 (2017) - [c18]Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck:
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. AsiaCCS 2017: 587-598 - [c17]Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock
, Fabian Yamaguchi:
Efficient and Flexible Discovery of PHP Application Vulnerabilities. EuroS&P 2017: 334-349 - [c16]Bhargava Shastry, Markus Leutner, Tobias Fiebig
, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid
, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. RAID 2017: 26-47 - [c15]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. WOOT 2017 - [c14]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. WOOT 2017 - [i4]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. CoRR abs/1704.02786 (2017) - [i3]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. CoRR abs/1706.00206 (2017) - 2016
- [j1]Fabian Yamaguchi, Konrad Rieck:
Die Codeanalyseplattform "Octopus". Datenschutz und Datensicherheit 40(11): 713-717 (2016) - [c13]Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck:
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms. CCS 2016: 541-552 - [c12]Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Towards Vulnerability Discovery Using Staged Program Analysis. DIMVA 2016: 78-97 - [c11]Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Comprehensive Analysis and Detection of Flash-Based Malware. DIMVA 2016: 101-121 - [i2]Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck:
From Malware Signatures to Anti-Virus Assisted Attacks. CoRR abs/1610.06022 (2016) - 2015
- [b1]Fabian Yamaguchi:
Pattern-Based Vulnerability Discovery. University of Göttingen, 2015 - [c10]Henning Perl, Sergej Dechand, Matthew Smith
, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar:
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. CCS 2015: 426-437 - [c9]Daniel Arp, Fabian Yamaguchi, Konrad Rieck:
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication. AsiaCCS 2015: 597-602 - [c8]Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. SecureComm 2015: 330-347 - [c7]Fabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck:
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities. IEEE Symposium on Security and Privacy 2015: 797-812 - [c6]Aylin Caliskan Islam, Richard E. Harang, Andrew Liu, Arvind Narayanan, Clare R. Voss, Fabian Yamaguchi, Rachel Greenstadt:
De-anonymizing Programmers via Code Stylometry. USENIX Security Symposium 2015: 255-270 - [i1]Aylin Caliskan Islam, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. CoRR abs/1512.08546 (2015) - 2014
- [c5]Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck:
Modeling and Discovering Vulnerabilities with Code Property Graphs. IEEE Symposium on Security and Privacy 2014: 590-604 - 2013
- [c4]Hugo Gascon, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Structural detection of android malware using embedded call graphs. AISec 2013: 45-54 - [c3]Fabian Yamaguchi, Christian Wressnegger, Hugo Gascon, Konrad Rieck:
Chucky: exposing missing checks in source code for vulnerability discovery. CCS 2013: 499-510 - 2012
- [c2]Fabian Yamaguchi, Markus Lottmann, Konrad Rieck:
Generalized vulnerability extrapolation using abstract syntax trees. ACSAC 2012: 359-368 - 2011
- [c1]Fabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck:
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. WOOT 2011: 118-127
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint