You are here

Biblio

Export 14 results:
Filters: Author is Thorsten Holz  [Clear All Filters]
2019
Güler E, Aschermann C, Abbasi A, Holz T.  2019.  AntiFuzz: Impeding Fuzzing Audits of Binary Executables. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1931--1947.
Blazytko T, Aschermann C, Schlögel M, Abbasi A, Schumilo S, Wörner S, Holz T.  2019.  GRIMOIRE: Synthesizing Structure while Fuzzing. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1985--2002.
2018
Gawlik R, Holz T.  2018.  SoK: Make JIT-Spray Great Again. 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).
2017
Schumilo S, Aschermann C, Gawlik R, Schinzel S, Holz T.  2017.  kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. 26th {USENIX} Security Symposium ({USENIX} Security 17). :167--182.
Koppe P, Kollenda B, Fyrbiak M, Kison C, Gawlik R, Paar C, Holz T.  2017.  Reverse Engineering x86 Processor Microcode. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1163--1180.
Blazytko T, Contag M, Aschermann C, Holz T.  2017.  Syntia: Synthesizing the Semantics of Obfuscated Code. 26th {USENIX} Security Symposium ({USENIX} Security 17). :643--659.
2016
Lettner J, Kollenda B, Homescu A, Larsen P, Schuster F, Davi L, Sadeghi A-R, Holz T, Franz M.  2016.  Subversive-C: Abusing and Protecting Dynamic Message Dispatch. 2016 {USENIX} Annual Technical Conference ({USENIX} {ATC} 16). :209--221.
Krombholz K, Hupperich T, Holz T.  2016.  Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). :207--219.
2014
Vogl S, Gawlik R, Garmany B, Kittel T, Pfoh J, Eckert C, Holz T.  2014.  Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :813--328.
Kührer M, Hupperich T, Rossow C, Holz T.  2014.  Exit from Hell? Reducing the Impact of Amplification DDoS Attacks 23rd {USENIX} Security Symposium ({USENIX} Security 14). :111--125.
Kührer M, Hupperich T, Rossow C, Holz T.  2014.  Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
Dahse J, Holz T.  2014.  Static Detection of Second-Order Vulnerabilities in Web Applications. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :989--1003.
2012
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). :16--32.
Büscher A, Holz T.  2012.  Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12).