Josselin Feist
Josselin Feist
Trail of Bits
Verified email at trailofbits.com - Homepage
Title
Cited by
Cited by
Year
Toward large-scale vulnerability discovery using machine learning
G Grieco, GL Grinblat, L Uzal, S Rawat, J Feist, L Mounier
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
1552016
Slither: A Static Analysis Framework For Smart Contracts
J Feist, G Grieco, A Groce
WETSEB 2019, 2019
89*2019
Statically detecting use after free on binary code
J Feist, L Mounier, ML Potet
Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014
862014
Manticore: A user-friendly symbolic execution framework for binaries and smart contracts
M Mossberg, F Manzano, E Hennenfent, A Groce, G Grieco, J Feist, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
632019
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis
R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
562016
Specification of concretization and symbolization policies in symbolic execution
R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion
Proceedings of the 25th International Symposium on Software Testing and …, 2016
292016
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free
J Feist, L Mounier, S Bardin, R David, ML Potet
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
192016
Echidna: effective, usable, and fast fuzzing for smart contracts
G Grieco, W Song, A Cygan, J Feist, A Groce
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
152020
What are the actual flaws in important smart contracts (and how can we find them)?
A Groce, J Feist, G Grieco, M Colburn
International Conference on Financial Cryptography and Data Security, 634-653, 2020
112020
Guided dynamic symbolic execution using subgraph control-flow information
J Feist, L Mounier, ML Potet
International Conference on Software Engineering and Formal Methods, 76-81, 2016
92016
Finding the needle in the heap: combining binary analysis techniques to trigger use-after-free
J Feist
Université Grenoble Alpes (ComUE), 2017
12017
Combining static analyses for helping detection and exploitability vulnerabilities in binary code
L Mounier, J Feist, ML Potet, S Rawat
2013
WETSEB 2019
I Lille, EG Boix, J Feist, G Grieco, A Groce, EH Lund, L Jaccheri, J Li, ...
The system can't perform the operation now. Try again later.
Articles 1–13