Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Leveraging Binary Analysis to Secure the Internet of Things

Publications

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Auteurs: Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Publié dans: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 189-200, ISBN 978-1-5386-0542-4
Éditeur: IEEE
DOI: 10.1109/DSN.2017.58

Syntia: Synthesizing the Semantics of Obfuscated Code

Auteurs: Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz
Publié dans: USENIX Security Symposium, 2017
Éditeur: USENIX

MARX: Uncovering Class Hierarchies in C++ Programs

Auteurs: Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
Publié dans: NDSS'17, 2017
Éditeur: ISOC

EvilCoder - automated bug insertion

Auteurs: Jannik Pewny, Thorsten Holz
Publié dans: Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16, 2016, Page(s) 214-225, ISBN 9781-450347716
Éditeur: ACM Press
DOI: 10.1145/2991079.2991103

Breaking and Fixing Destructive Code Read Defenses

Auteurs: Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Publié dans: Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017, 2017, Page(s) 55-67, ISBN 9781-450353458
Éditeur: ACM Press
DOI: 10.1145/3134600.3134626

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Auteurs: Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
Publié dans: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Page(s) 231-250, ISBN 978-1-5090-5533-3
Éditeur: IEEE
DOI: 10.1109/SP.2017.66

Reverse Engineering x86 Processor Microcode

Auteurs: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz
Publié dans: USENIX Security Symposium, 2017, ISBN 978-1-931971-40-9
Éditeur: USENIX

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Auteurs: Julian Lettner, University of California, Irvine; Benjamin Kollenda, Ruhr-Universität Bochum; Andrei Homescu, Immunant, Inc.; Per Larsen, University of California, Irvine, and Immunant, Inc.; Felix Schuster, Microsoft Research; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt; Thorsten Holz, Ruhr-Universität Bochum; Michael Franz, University of California, Irvine
Publié dans: 2016 USENIX Annual Technical Conference (USENIX ATC ’16), 2016
Éditeur: USENIX

Cross-Architecture Bug Search in Binary Executables

Auteurs: Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
Publié dans: 2015 IEEE Symposium on Security and Privacy, 2015, Page(s) 709-724, ISBN 978-1-4673-6949-7
Éditeur: IEEE
DOI: 10.1109/SP.2015.49

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Auteurs: Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany and Thorsten Holz Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany
Publié dans: Network and Distributed System Security Symposium (NDSS) 2016, 2016
Éditeur: Internet Society

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Auteurs: Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawoloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
Publié dans: 2016 IEEE Symposium on Security and Privacy (SP), 2016, Page(s) 934-953, ISBN 978-1-5090-0824-7
Éditeur: IEEE
DOI: 10.1109/SP.2016.60

Towards Automated Application-Specific Software Stacks

Auteurs: Davidsson, Nicolai; Pawlowski, Andre; Holz, Thorsten
Publié dans: ESORICS 2019, 2019
Éditeur: Springer

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Auteurs: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Publié dans: ACSAC'19, 2019
Éditeur: ACSAC

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Auteurs: Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Publié dans: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 227-242, ISBN 978-1-5386-4228-3
Éditeur: IEEE
DOI: 10.1109/eurosp.2018.00024

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Auteurs: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Publié dans: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 1649-1666, ISBN 9781-450356930
Éditeur: ACM
DOI: 10.1145/3243734.3243861

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Auteurs: Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
Publié dans: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 31-46, ISBN 978-1-7281-1148-3
Éditeur: IEEE
DOI: 10.1109/eurosp.2019.00013

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming

Auteurs: Jannik Pewny, Philipp Koppe, Thorsten Holz
Publié dans: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 111-126, ISBN 978-1-7281-1148-3
Éditeur: IEEE
DOI: 10.1109/eurosp.2019.00018

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Auteurs: Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Publié dans: Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Éditeur: Internet Society
DOI: 10.14722/ndss.2020.23096

IJON: Exploring Deep State Spaces via Fuzzing

Auteurs: Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz
Publié dans: IEEE Symposium on Security & Privacy, 2020
Éditeur: IEEE

Detile: Fine-Grained Information Leak Detection in Script Engines

Auteurs: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Publié dans: Detection of Intrusions and Malware, and Vulnerability Assessment, 2016, Page(s) 322-342, ISBN 978-3-319-40667-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-40667-1_16

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

Auteurs: Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
Publié dans: Computer Security – ESORICS 2016, 2016, Page(s) 602-620, ISBN 978-3-319-45744-4
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_30

Static Detection of Uninitialized Stack Variables in Binary Code

Auteurs: Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
Publié dans: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Numéro 11736, 2019, Page(s) 68-87, ISBN 978-3-030-29961-3
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_4

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible