Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Leveraging Binary Analysis to Secure the Internet of Things

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

Author(s): Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R. K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz
Published in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 189-200, ISBN 978-1-5386-0542-4
Publisher: IEEE
DOI: 10.1109/DSN.2017.58

Syntia: Synthesizing the Semantics of Obfuscated Code

Author(s): Tim Blazytko, Moritz Contag, Cornelius Aschermann, and Thorsten Holz
Published in: USENIX Security Symposium, 2017
Publisher: USENIX

MARX: Uncovering Class Hierarchies in C++ Programs

Author(s): Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida
Published in: NDSS'17, 2017
Publisher: ISOC

EvilCoder - automated bug insertion

Author(s): Jannik Pewny, Thorsten Holz
Published in: Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16, 2016, Page(s) 214-225, ISBN 9781-450347716
Publisher: ACM Press
DOI: 10.1145/2991079.2991103

Breaking and Fixing Destructive Code Read Defenses

Author(s): Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
Published in: Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017, 2017, Page(s) 55-67, ISBN 9781-450353458
Publisher: ACM Press
DOI: 10.1145/3134600.3134626

How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles

Author(s): Moritz Contag, Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage
Published in: 2017 IEEE Symposium on Security and Privacy (SP), 2017, Page(s) 231-250, ISBN 978-1-5090-5533-3
Publisher: IEEE
DOI: 10.1109/SP.2017.66

Reverse Engineering x86 Processor Microcode

Author(s): Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, and Thorsten Holz
Published in: USENIX Security Symposium, 2017, ISBN 978-1-931971-40-9
Publisher: USENIX

Subversive-C: Abusing and Protecting Dynamic Message Dispatch

Author(s): Julian Lettner, University of California, Irvine; Benjamin Kollenda, Ruhr-Universität Bochum; Andrei Homescu, Immunant, Inc.; Per Larsen, University of California, Irvine, and Immunant, Inc.; Felix Schuster, Microsoft Research; Lucas Davi and Ahmad-Reza Sadeghi, Technische Universität Darmstadt; Thorsten Holz, Ruhr-Universität Bochum; Michael Franz, University of California, Irvine
Published in: 2016 USENIX Annual Technical Conference (USENIX ATC ’16), 2016
Publisher: USENIX

Cross-Architecture Bug Search in Binary Executables

Author(s): Jannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz
Published in: 2015 IEEE Symposium on Security and Privacy, 2015, Page(s) 709-724, ISBN 978-1-4673-6949-7
Publisher: IEEE
DOI: 10.1109/SP.2015.49

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding

Author(s): Robert Gawlik, Benjamin Kollenda, Philipp Koppe, Behrad Garmany and Thorsten Holz Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany
Published in: Network and Distributed System Security Symposium (NDSS) 2016, 2016
Publisher: Internet Society

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Author(s): Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawoloski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida
Published in: 2016 IEEE Symposium on Security and Privacy (SP), 2016, Page(s) 934-953, ISBN 978-1-5090-0824-7
Publisher: IEEE
DOI: 10.1109/SP.2016.60

Towards Automated Application-Specific Software Stacks

Author(s): Davidsson, Nicolai; Pawlowski, Andre; Holz, Thorsten
Published in: ESORICS 2019, 2019
Publisher: Springer

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Author(s): Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Published in: ACSAC'19, 2019
Publisher: ACSAC

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

Author(s): Enes Goktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida
Published in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 227-242, ISBN 978-1-5386-4228-3
Publisher: IEEE
DOI: 10.1109/eurosp.2018.00024

An Exploratory Analysis of Microcode as a Building Block for System Defenses

Author(s): Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 1649-1666, ISBN 9781-450356930
Publisher: ACM
DOI: 10.1145/3243734.3243861

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems

Author(s): Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
Published in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 31-46, ISBN 978-1-7281-1148-3
Publisher: IEEE
DOI: 10.1109/eurosp.2019.00013

STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming

Author(s): Jannik Pewny, Philipp Koppe, Thorsten Holz
Published in: 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Page(s) 111-126, ISBN 978-1-7281-1148-3
Publisher: IEEE
DOI: 10.1109/eurosp.2019.00018

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing

Author(s): Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Published in: Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Publisher: Internet Society
DOI: 10.14722/ndss.2020.23096

IJON: Exploring Deep State Spaces via Fuzzing

Author(s): Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz
Published in: IEEE Symposium on Security & Privacy, 2020
Publisher: IEEE

Detile: Fine-Grained Information Leak Detection in Script Engines

Author(s): Robert Gawlik, Philipp Koppe, Benjamin Kollenda, Andre Pawlowski, Behrad Garmany, Thorsten Holz
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, 2016, Page(s) 322-342, ISBN 978-3-319-40667-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-40667-1_16

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets

Author(s): Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz
Published in: Computer Security – ESORICS 2016, 2016, Page(s) 602-620, ISBN 978-3-319-45744-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_30

Static Detection of Uninitialized Stack Variables in Binary Code

Author(s): Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Issue 11736, 2019, Page(s) 68-87, ISBN 978-3-030-29961-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_4

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available