Skip to main content

Leveraging Binary Analysis to Secure the Internet of Things

Searching for OpenAIRE data...


Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Author(s): Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Published in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 189-200
DOI: 10.1109/DSN.2017.58

Syntia: Synthesizing the Semantics of Obfuscated Code

Author(s): Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz
Published in: USENIX Security Symposium, 2017

MARX: Uncovering Class Hierarchies in C++ Programs

Author(s): Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
Published in: NDSS'17, 2017

EvilCoder - automated bug insertion

Author(s): Jannik Pewny, Thorsten Holz
Published in: Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16, 2016, Page(s) 214-225
DOI: 10.1145/2991079.2991103

Breaking and Fixing Destructive Code Read Defenses

Author(s): Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Published in: Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017, 2017, Page(s) 55-67
DOI: 10.1145/3134600.3134626

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Author(s): Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
Published in: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Page(s) 231-250
DOI: 10.1109/SP.2017.66

Reverse Engineering x86 Processor Microcode

Author(s): Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz
Published in: USENIX Security Symposium, 2017

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Author(s): Julian Lettner, University of California, Irvine; Benjamin Kollenda, Ruhr-Universität Bochum; Andrei Homescu, Immunant, Inc.; Per Larsen, University of California, Irvine, and Immunant, Inc.; Felix Schuster, Microsoft Research; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt; Thorsten Holz, Ruhr-Universität Bochum; Michael Franz, University of California, Irvine
Published in: 2016 USENIX Annual Technical Conference (USENIX ATC ’16), 2016

Cross-Architecture Bug Search in Binary Executables

Author(s): Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
Published in: 2015 IEEE Symposium on Security and Privacy, 2015, Page(s) 709-724
DOI: 10.1109/SP.2015.49

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Author(s): Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany and Thorsten Holz Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany
Published in: Network and Distributed System Security Symposium (NDSS) 2016, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Author(s): Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawoloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
Published in: 2016 IEEE Symposium on Security and Privacy (SP), 2016, Page(s) 934-953
DOI: 10.1109/SP.2016.60

Towards Automated Application-Specific Software Stacks

Author(s): Davidsson, Nicolai; Pawlowski, Andre; Holz, Thorsten
Published in: ESORICS 2019, 2019

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Author(s): Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Published in: ACSAC'19, 2019

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Author(s): Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Published in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 227-242
DOI: 10.1109/eurosp.2018.00024

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Author(s): Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 1649-1666
DOI: 10.1145/3243734.3243861

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Author(s): Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
Published in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 31-46
DOI: 10.1109/eurosp.2019.00013

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming

Author(s): Jannik Pewny, Philipp Koppe, Thorsten Holz
Published in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 111-126
DOI: 10.1109/eurosp.2019.00018

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Author(s): Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Published in: Proceedings 2020 Network and Distributed System Security Symposium, 2020
DOI: 10.14722/ndss.2020.23096

IJON: Exploring Deep State Spaces via Fuzzing

Author(s): Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz
Published in: IEEE Symposium on Security & Privacy, 2020

Detile: Fine-Grained Information Leak Detection in Script Engines

Author(s): Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, 2016, Page(s) 322-342
DOI: 10.1007/978-3-319-40667-1_16

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

Author(s): Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
Published in: Computer Security – ESORICS 2016, 2016, Page(s) 602-620
DOI: 10.1007/978-3-319-45744-4_30

Static Detection of Uninitialized Stack Variables in Binary Code

Author(s): Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Issue 11736, 2019, Page(s) 68-87
DOI: 10.1007/978-3-030-29962-0_4