Folgen
Mathias Payer
Mathias Payer
EPFL IC, HexHive Laboratory
Bestätigte E-Mail-Adresse bei nebelwelt.net - Startseite
Titel
Zitiert von
Zitiert von
Jahr
{Control-Flow} bending: On the effectiveness of {Control-Flow} integrity
N Carlini, A Barresi, M Payer, D Wagner, TR Gross
24th USENIX Security Symposium (USENIX Security 15), 161-176, 2015
1293*2015
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10462014
SoK: Eternal War in Memory
L Szekeres, M Payer, T Wei, D Song
Security and Privacy (SP), 2013 IEEE Symposium on, 48-62, 2013
9992013
Code-pointer integrity
K Volodymyr, S Laszlo, P Mathias, C George, R Sekar
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014
654*2014
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
3672017
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili, M Payer
2018 IEEE Symposium on Security and Privacy (SP), 697-710, 2018
3642018
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3562020
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2322019
Fine-Grained Control-Flow Integrity through Binary Hardening
M Payer, A Barresi, TR Gross
DIMVA '15: Conference on Detection of Intrusions and Malware & Vulnerability …, 2015
1852015
HexPADS: a platform to detect “stealth” attacks
M Payer
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
1802016
SoK: Shining light on shadow stacks
N Burow, X Zhang, M Payer
2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019
1742019
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
S Dinesh, N Burow, D Xu, M Payer
2020 IEEE Symposium on Security and Privacy (SP), 1497-1511, 2020
1662020
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1552018
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
1532020
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016
1512016
Magma: A ground-truth fuzzing benchmark
A Hazimeh, A Herrera, M Payer
Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on …, 2021
1502021
Protecting bare-metal embedded systems with privilege overlays
AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ...
2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017
1302017
The Correctness-Security Gap in Compiler Optimization
V D’Silva, M Payer, D Song
Second Language-theoretic Security (LangSec) IEEE S&P Workshop, 2015
1302015
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1132020
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1112016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20