Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Resilient and Sustainable Software Security

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

No Peer, no Cry: Network Application Fuzzing via Fault Injection (opens in new window)

Author(s): Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz
Published in: ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, 2024
Publisher: ACM
DOI: 10.1145/3658644.369027

Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space (opens in new window)

Author(s): Johannes Willbold, Tobias Cloosters, Simon Wörner, Felix Buchmann, Moritz Schloegel, Lucas Davi, Thorsten Holz
Published in: 2025 IEEE Symposium on Security and Privacy (SP), 2025
Publisher: IEEE
DOI: 10.1109/SP61157.2025.00139

Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities

Author(s): Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz
Published in: USENIX Security Symposium 2024, 2024
Publisher: USENIX

An Experimental Software Security Analysis of Satellites

Author(s): Johannes Willbold, Moritz Schloegel, Manuel Vögele, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi
Published in: 2023 IEEE Symposium on Security and Privacy (SP), 2023
Publisher: IEEE

DarthShader: Fuzzing WebGPU Shader Translators & Compilers (opens in new window)

Author(s): Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz
Published in: ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, 2024
Publisher: ACM
DOI: 10.1145/3658644.3690209

"No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning" (opens in new window)

Author(s): Thorsten Eisenhofer; Erwin Quiring; Jonas Möller; Doreen Riepel; Thorsten Holz; Konrad Rieck
Published in: USENIX Security, 2023
Publisher: USENIX
DOI: 10.48550/arxiv.2303.14443

Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs

Author(s): Tobias Scharnowski, Simon Wörner, Felix Buchmann, Nils Bars, Moritz Schloegel, Thorsten Holz
Published in: USENIX Security Symposium 2023, 2023
Publisher: USENIX

SoK: Prudent Evaluation Practices for Fuzzing

Author(s): Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz
Published in: 2024 IEEE Symposium on Security and Privacy, 2024
Publisher: IEEE

A Comprehensive Memory Safety Analysis of Bootloaders (opens in new window)

Author(s): Jianqiang Wang, Meng Wang, Qinying Wang, Nils Langius, Li Shi, Ali Abbasi, Thorsten Holz
Published in: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Publisher: Internet Society
DOI: 10.14722/NDSS.2025.240330

Systematic Assessment of Fuzzers using Mutation Analysis

Author(s): Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath
Published in: USENIX Security Symposium 2023, 2023
Publisher: USENIX

TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks (opens in new window)

Author(s): Matteo Leonelli, Addison Crump, Meng Wang, Florian Bauckholt, Keno Hassler, Ali Abbasi, Thorsten Holz
Published in: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Publisher: Internet Society
DOI: 10.14722/NDSS.2025.240526

A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard

Author(s): Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz
Published in: USENIX Security Symposium 2024, 2024
Publisher: USENIX

Novelty Not Found: Exploring Input Shadowing in Fuzzing through Adaptive Fuzzer Restarts (opens in new window)

Author(s): Nico Schiller, Xinyi Xu, Lukas Bernhard, Nils Bars, Moritz Schloegel, Thorsten Holz
Published in: ACM Transactions on Software Engineering and Methodology, Issue 34, 2025, ISSN 1049-331X
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3712186

Memory Corruption at the Border of Trusted Execution (opens in new window)

Author(s): Tobias Cloosters; Oussama Draissi; Johannes Willbold; Thorsten Holz; Lucas Davi
Published in: IEEE Security & Privacy, 2024
Publisher: IEEE
DOI: 10.60882/cispa.25688667

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0