Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Leveraging Binary Analysis to Secure the Internet of Things

Publicaciones

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Autores: Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Publicado en: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Página(s) 189-200, ISBN 978-1-5386-0542-4
Editor: IEEE
DOI: 10.1109/DSN.2017.58

Syntia: Synthesizing the Semantics of Obfuscated Code

Autores: Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz
Publicado en: USENIX Security Symposium, 2017
Editor: USENIX

MARX: Uncovering Class Hierarchies in C++ Programs

Autores: Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
Publicado en: NDSS'17, 2017
Editor: ISOC

EvilCoder - automated bug insertion

Autores: Jannik Pewny, Thorsten Holz
Publicado en: Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16, 2016, Página(s) 214-225, ISBN 9781-450347716
Editor: ACM Press
DOI: 10.1145/2991079.2991103

Breaking and Fixing Destructive Code Read Defenses

Autores: Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Publicado en: Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017, 2017, Página(s) 55-67, ISBN 9781-450353458
Editor: ACM Press
DOI: 10.1145/3134600.3134626

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Autores: Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
Publicado en: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Página(s) 231-250, ISBN 978-1-5090-5533-3
Editor: IEEE
DOI: 10.1109/SP.2017.66

Reverse Engineering x86 Processor Microcode

Autores: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz
Publicado en: USENIX Security Symposium, 2017, ISBN 978-1-931971-40-9
Editor: USENIX

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Autores: Julian Lettner, University of California, Irvine; Benjamin Kollenda, Ruhr-Universität Bochum; Andrei Homescu, Immunant, Inc.; Per Larsen, University of California, Irvine, and Immunant, Inc.; Felix Schuster, Microsoft Research; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt; Thorsten Holz, Ruhr-Universität Bochum; Michael Franz, University of California, Irvine
Publicado en: 2016 USENIX Annual Technical Conference (USENIX ATC ’16), 2016
Editor: USENIX

Cross-Architecture Bug Search in Binary Executables

Autores: Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
Publicado en: 2015 IEEE Symposium on Security and Privacy, 2015, Página(s) 709-724, ISBN 978-1-4673-6949-7
Editor: IEEE
DOI: 10.1109/SP.2015.49

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Autores: Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany and Thorsten Holz Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany
Publicado en: Network and Distributed System Security Symposium (NDSS) 2016, 2016
Editor: Internet Society

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Autores: Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawoloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
Publicado en: 2016 IEEE Symposium on Security and Privacy (SP), 2016, Página(s) 934-953, ISBN 978-1-5090-0824-7
Editor: IEEE
DOI: 10.1109/SP.2016.60

Towards Automated Application-Specific Software Stacks

Autores: Davidsson, Nicolai; Pawlowski, Andre; Holz, Thorsten
Publicado en: ESORICS 2019, 2019
Editor: Springer

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Autores: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Publicado en: ACSAC'19, 2019
Editor: ACSAC

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Autores: Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Publicado en: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Página(s) 227-242, ISBN 978-1-5386-4228-3
Editor: IEEE
DOI: 10.1109/eurosp.2018.00024

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Autores: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Publicado en: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Página(s) 1649-1666, ISBN 9781-450356930
Editor: ACM
DOI: 10.1145/3243734.3243861

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Autores: Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
Publicado en: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Página(s) 31-46, ISBN 978-1-7281-1148-3
Editor: IEEE
DOI: 10.1109/eurosp.2019.00013

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming

Autores: Jannik Pewny, Philipp Koppe, Thorsten Holz
Publicado en: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Página(s) 111-126, ISBN 978-1-7281-1148-3
Editor: IEEE
DOI: 10.1109/eurosp.2019.00018

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Autores: Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Publicado en: Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Editor: Internet Society
DOI: 10.14722/ndss.2020.23096

IJON: Exploring Deep State Spaces via Fuzzing

Autores: Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz
Publicado en: IEEE Symposium on Security & Privacy, 2020
Editor: IEEE

Detile: Fine-Grained Information Leak Detection in Script Engines

Autores: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Publicado en: Detection of Intrusions and Malware, and Vulnerability Assessment, 2016, Página(s) 322-342, ISBN 978-3-319-40667-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-40667-1_16

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

Autores: Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
Publicado en: Computer Security – ESORICS 2016, 2016, Página(s) 602-620, ISBN 978-3-319-45744-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_30

Static Detection of Uninitialized Stack Variables in Binary Code

Autores: Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
Publicado en: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Edición 11736, 2019, Página(s) 68-87, ISBN 978-3-030-29961-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_4

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles