Follow
Stanislav Dashevskyi
Stanislav Dashevskyi
Forescout Technologies
Verified email at forescout.com - Homepage
Title
Cited by
Cited by
Year
An automatic method for assessing the versions affected by a vulnerability
VH Nguyen, S Dashevskyi, F Massacci
Empirical Software Engineering 21, 2268-2297, 2016
742016
A screening test for disclosed vulnerabilities in foss components
S Dashevskyi, AD Brucker, F Massacci
IEEE Transactions on Software Engineering 45 (10), 945-966, 2018
412018
Fine-grained code coverage measurement in automated black-box android testing
A Pilgun, O Gadyatskaya, Y Zhauniarovich, S Dashevskyi, A Kushniarou, ...
ACM Transactions on Software Engineering and Methodology (TOSEM) 29 (4), 1-35, 2020
392020
{TESTREX}: a Testbed for Repeatable Exploits
S Dashevskyi, DR Dos Santos, F Massacci, A Sabetta
7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014
24*2014
On the security cost of using a free and open source component in a proprietary product
S Dashevskyi, AD Brucker, F Massacci
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
232016
Delta-bench: Differential benchmark for static analysis security testing tools
I Pashchenko, S Dashevskyi, F Massacci
2017 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2017
222017
Dissecting android cryptocurrency miners
S Dashevskyi, Y Zhauniarovich, O Gadyatskaya, A Pilgun, H Ouhssain
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
212020
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
202017
Vulnerability analysis of software components
AD Brucker, S Dashevskyi
US Patent 10,691,808, 2020
172020
An effective android code coverage tool
A Pilgun, O Gadyatskaya, S Dashevskyi, Y Zhauniarovich, A Kushniarou
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
172018
The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android
S Dashevskyi, O Gadyatskaya, A Pilgun, Y Zhauniarovich
Proc. of CCS 10 (3243734.3278524), 2018
122018
An experimental approach for estimating cyber risk: a proposal building upon cyber ranges and capture the flags
G Di Tizio, F Massacci, L Allodi, S Dashevskyi, J Mirkovic
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 56-65, 2020
82020
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices
D dos Santos, S Dashevskyi, J Wetzels, A Amri
Forescout Research Labs, 2021
62021
NAME:WRECK Breaking and fixing DNS implementations
D dos Santos, S Dashevskyi, A Amri, J Wetzels, O Shlomi, M Kol
Black Hat Asia, 2021
52021
An Introduction to Data Analytics For Software Security
L ben Othmane, AD Brucker, S Dashevskyi, P Tsalovski
Empirical Research for Software Security, 69-94, 2017
22017
Demonstration of new attacks on three healthcare network protocols in a lab environment
G Dupont, D dos Santos, S Dashevskyi, S Vijayakumar, SP Murali, ...
Journal of Computer Virology and Hacking Techniques 20 (2), 301-314, 2024
2024
RFC 9267: Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing.
S Dashevskyi, DR dos Santos, J Wetzels, A Amri
https://datatracker.ietf.org/doc/html/rfc9267, 2022
2022
Security assessment of open source third-parties applications
S Dashevskyi
Università degli studi di Trento, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–18