USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 30 results:
Filters: Author is Thorsten Holz [Clear All Filters]
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge. 32nd USENIX Security Symposium (USENIX Security 23). :1847--1864.
.
2023. No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. 32nd USENIX Security Symposium (USENIX Security 23). :5109--5126.
.
2023. Systematic Assessment of Fuzzers using Mutation Analysis. 32nd USENIX Security Symposium (USENIX Security 23). :4535--4552.
.
2023. Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :1239--1256.
.
2022. Loki: Hardening Code Obfuscation Against Automated Attacks. 31st USENIX Security Symposium (USENIX Security 22). :3055--3073.
.
2022. SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. 31st USENIX Security Symposium (USENIX Security 22). :3147--3164.
.
2022. Dompteur: Taming Audio Adversarial Examples. 30th USENIX Security Symposium (USENIX Security 21). :2309--2326.
.
2021. Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. 30th USENIX Security Symposium (USENIX Security 21). :2597--2614.
.
2021. AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. 29th USENIX Security Symposium (USENIX Security 20). :235--252.
.
2020. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. 29th USENIX Security Symposium (USENIX Security 20). :73--88.
.
2020. ETHBMC: A Bounded Model Checker for Smart Contracts. 29th USENIX Security Symposium (USENIX Security 20). :2757--2774.
.
2020. AntiFuzz: Impeding Fuzzing Audits of Binary Executables. 28th USENIX Security Symposium (USENIX Security 19). :1931--1947.
.
2019. GRIMOIRE: Synthesizing Structure while Fuzzing. 28th USENIX Security Symposium (USENIX Security 19). :1985--2002.
.
2019. SoK: Make JIT-Spray Great Again. 12th USENIX Workshop on Offensive Technologies (WOOT 18).
.
2018. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. 26th USENIX Security Symposium (USENIX Security 17). :167--182.
.
2017. Reverse Engineering x86 Processor Microcode. 26th USENIX Security Symposium (USENIX Security 17). :1163--1180.
.
2017. Syntia: Synthesizing the Semantics of Obfuscated Code. 26th USENIX Security Symposium (USENIX Security 17). :643--659.
.
2017. Subversive-C: Abusing and Protecting Dynamic Message Dispatch. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :209--221.
.
2016. Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). :207--219.
.
2016. Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. 23rd USENIX Security Symposium (USENIX Security 14). :813--328.
.
2014. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks 23rd USENIX Security Symposium (USENIX Security 14). :111--125.
.
2014. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Static Detection of Second-Order Vulnerabilities in Web Applications. 23rd USENIX Security Symposium (USENIX Security 14). :989--1003.
.
2014. B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
.
2012. Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
.
2012.