Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Leveraging Binary Analysis to Secure the Internet of Things

Pubblicazioni

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Autori: Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Pubblicato in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Pagina/e 189-200, ISBN 978-1-5386-0542-4
Editore: IEEE
DOI: 10.1109/DSN.2017.58

Syntia: Synthesizing the Semantics of Obfuscated Code

Autori: Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz
Pubblicato in: USENIX Security Symposium, 2017
Editore: USENIX

MARX: Uncovering Class Hierarchies in C++ Programs

Autori: Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
Pubblicato in: NDSS'17, 2017
Editore: ISOC

EvilCoder - automated bug insertion

Autori: Jannik Pewny, Thorsten Holz
Pubblicato in: Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16, 2016, Pagina/e 214-225, ISBN 9781-450347716
Editore: ACM Press
DOI: 10.1145/2991079.2991103

Breaking and Fixing Destructive Code Read Defenses

Autori: Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Pubblicato in: Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017, 2017, Pagina/e 55-67, ISBN 9781-450353458
Editore: ACM Press
DOI: 10.1145/3134600.3134626

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Autori: Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
Pubblicato in: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Pagina/e 231-250, ISBN 978-1-5090-5533-3
Editore: IEEE
DOI: 10.1109/SP.2017.66

Reverse Engineering x86 Processor Microcode

Autori: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz
Pubblicato in: USENIX Security Symposium, 2017, ISBN 978-1-931971-40-9
Editore: USENIX

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Autori: Julian Lettner, University of California, Irvine; Benjamin Kollenda, Ruhr-Universität Bochum; Andrei Homescu, Immunant, Inc.; Per Larsen, University of California, Irvine, and Immunant, Inc.; Felix Schuster, Microsoft Research; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt; Thorsten Holz, Ruhr-Universität Bochum; Michael Franz, University of California, Irvine
Pubblicato in: 2016 USENIX Annual Technical Conference (USENIX ATC ’16), 2016
Editore: USENIX

Cross-Architecture Bug Search in Binary Executables

Autori: Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
Pubblicato in: 2015 IEEE Symposium on Security and Privacy, 2015, Pagina/e 709-724, ISBN 978-1-4673-6949-7
Editore: IEEE
DOI: 10.1109/SP.2015.49

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Autori: Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany and Thorsten Holz Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany
Pubblicato in: Network and Distributed System Security Symposium (NDSS) 2016, 2016
Editore: Internet Society

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Autori: Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawoloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
Pubblicato in: 2016 IEEE Symposium on Security and Privacy (SP), 2016, Pagina/e 934-953, ISBN 978-1-5090-0824-7
Editore: IEEE
DOI: 10.1109/SP.2016.60

Towards Automated Application-Specific Software Stacks

Autori: Davidsson, Nicolai; Pawlowski, Andre; Holz, Thorsten
Pubblicato in: ESORICS 2019, 2019
Editore: Springer

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Autori: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Pubblicato in: ACSAC'19, 2019
Editore: ACSAC

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Autori: Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Pubblicato in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Pagina/e 227-242, ISBN 978-1-5386-4228-3
Editore: IEEE
DOI: 10.1109/eurosp.2018.00024

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Autori: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Pubblicato in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Pagina/e 1649-1666, ISBN 9781-450356930
Editore: ACM
DOI: 10.1145/3243734.3243861

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Autori: Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
Pubblicato in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Pagina/e 31-46, ISBN 978-1-7281-1148-3
Editore: IEEE
DOI: 10.1109/eurosp.2019.00013

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming

Autori: Jannik Pewny, Philipp Koppe, Thorsten Holz
Pubblicato in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Pagina/e 111-126, ISBN 978-1-7281-1148-3
Editore: IEEE
DOI: 10.1109/eurosp.2019.00018

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Autori: Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Pubblicato in: Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Editore: Internet Society
DOI: 10.14722/ndss.2020.23096

IJON: Exploring Deep State Spaces via Fuzzing

Autori: Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz
Pubblicato in: IEEE Symposium on Security & Privacy, 2020
Editore: IEEE

Detile: Fine-Grained Information Leak Detection in Script Engines

Autori: Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Pubblicato in: Detection of Intrusions and Malware, and Vulnerability Assessment, 2016, Pagina/e 322-342, ISBN 978-3-319-40667-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-40667-1_16

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

Autori: Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
Pubblicato in: Computer Security – ESORICS 2016, 2016, Pagina/e 602-620, ISBN 978-3-319-45744-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_30

Static Detection of Uninitialized Stack Variables in Binary Code

Autori: Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
Pubblicato in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Numero 11736, 2019, Pagina/e 68-87, ISBN 978-3-030-29961-3
Editore: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_4

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile