Author of the publication

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.

, , , , , , , , and . DSN, page 189-200. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REDQUEEN: Fuzzing with Input-to-State Correspondence., , , , and . NDSS, The Internet Society, (2019)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , and . USENIX Security Symposium, page 1985-2002. USENIX Association, (2019)Loki: Hardening Code Obfuscation Against Automated Attacks., , , , , , and . USENIX Security Symposium, page 3055-3073. USENIX Association, (2022)AURORA: Statistical Crash Analysis for Automated Root Cause Explanation., , , , , , and . USENIX Security Symposium, page 235-252. USENIX Association, (2020)Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains., , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 218-239. Springer, (2021)Towards Automated Generation of Exploitation Primitives for Web Browsers., , , , , and . ACSAC, page 300-312. ACM, (2018)Loki: Hardening Code Obfuscation Against Automated Attacks., , , , , , and . CoRR, (2021)Reasoning about software security via synthesized behavioral substitutes.. Ruhr University Bochum, Germany, (2020)Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks., and . CCS, page 3553-3554. ACM, (2022)JIT-Picking: Differential Fuzzing of JavaScript Engines., , , , and . CCS, page 351-364. ACM, (2022)