default search action
Stefan Nagy
Person information
- affiliation: University of Utah, Salt Lake City, USA
- affiliation (former): Virginia Tech, Departments of Computer Science, Blacksburg, VA, USA
- affiliation (former): University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Stefan Nagy:
Practical Feedback and Instrumentation Enhancements for Performant Security Testing of Closed-source Executables. Virginia Tech, Blacksburg, VA, USA, 2022
Journal Articles
- 2023
- [j2]Stefan Nagy:
Research for Practice: The Fun in Fuzzing. Commun. ACM 66(5): 48-50 (2023) - 2022
- [j1]Stefan Nagy, Peter Alvaro:
The Fun in Fuzzing: The debugging technique comes into its own. ACM Queue 20(6): 80-87 (2022)
Conference and Workshop Papers
- 2023
- [c9]Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. CCS 2023: 1257-1271 - [c8]Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks:
No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting. USENIX Security Symposium 2023: 4913-4929 - 2022
- [c7]Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. ACSAC 2022: 388-399 - 2021
- [c6]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. CCS 2021: 351-365 - [c5]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. USENIX Security Symposium 2021: 1683-1700 - 2019
- [c4]Thomas C. H. Lux, Stefan Nagy, Mohammed Almanaa, Sirui Yao, Reid Bixler:
A Case Study on a Sustainable Framework for Ethically Aware Predictive Modeling. ISTAS 2019: 1-7 - [c3]Stefan Nagy, Matthew Hicks:
Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing. IEEE Symposium on Security and Privacy 2019: 787-802 - 2018
- [c2]Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure coding practices in Java: challenges and vulnerabilities. ICSE 2018: 372-383 - 2015
- [c1]Imani Palmer, Elaine Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell:
Digital Forensics Education: A Multidisciplinary Curriculum Model. ICDF2C 2015: 3-15
Informal and Other Publications
- 2023
- [i4]Chaitra Niddodi, Stefan Nagy, Darko Marinov, Sibin Mohan:
TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing. CoRR abs/2309.09522 (2023) - 2022
- [i3]Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks:
Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing. CoRR abs/2209.03441 (2022) - 2018
- [i2]Stefan Nagy, Matthew Hicks:
Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing. CoRR abs/1812.11875 (2018) - 2017
- [i1]Na Meng, Stefan Nagy, Danfeng Daphne Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure Coding Practices in Java: Challenges and Vulnerabilities. CoRR abs/1709.09970 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint