Biblio

Export 30 results:
Filters: Author is Thorsten Holz  [Clear All Filters]
2021
Eisenhofer T, Schönherr L, Frank J, Speckemeier L, Kolossa D, Holz T.  2021.  Dompteur: Taming Audio Adversarial Examples. 30th USENIX Security Symposium (USENIX Security 21). :2309--2326.
Schumilo S, Aschermann C, Abbasi A, Wör­ner S, Holz T.  2021.  Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. 30th USENIX Security Symposium (USENIX Security 21). :2597--2614.
2020
Blazytko T, Schlögel M, Aschermann C, Abbasi A, Frank J, Wörner S, Holz T.  2020.  AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. 29th USENIX Security Symposium (USENIX Security 20). :235--252.
Rupprecht D, Kohls K, Holz T, Pöpper C.  2020.  Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. 29th USENIX Security Symposium (USENIX Security 20). :73--88.
Frank J, Aschermann C, Holz T.  2020.  ETHBMC: A Bounded Model Checker for Smart Contracts. 29th USENIX Security Symposium (USENIX Security 20). :2757--2774.
2019
Güler E, Aschermann C, Abbasi A, Holz T.  2019.  AntiFuzz: Impeding Fuzzing Audits of Binary Executables. 28th USENIX Security Symposium (USENIX Security 19). :1931--1947.
Blazytko T, Aschermann C, Schlögel M, Abbasi A, Schumilo S, Wörner S, Holz T.  2019.  GRIMOIRE: Synthesizing Structure while Fuzzing. 28th USENIX Security Symposium (USENIX Security 19). :1985--2002.
2018
Gawlik R, Holz T.  2018.  SoK: Make JIT-Spray Great Again. 12th USENIX Workshop on Offensive Technologies (WOOT 18).
2017
Schumilo S, Aschermann C, Gawlik R, Schinzel S, Holz T.  2017.  kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. 26th USENIX Security Symposium (USENIX Security 17). :167--182.
Koppe P, Kollenda B, Fyrbiak M, Kison C, Gawlik R, Paar C, Holz T.  2017.  Reverse Engineering x86 Processor Microcode. 26th USENIX Security Symposium (USENIX Security 17). :1163--1180.
Blazytko T, Contag M, Aschermann C, Holz T.  2017.  Syntia: Synthesizing the Semantics of Obfuscated Code. 26th USENIX Security Symposium (USENIX Security 17). :643--659.
2016
Lettner J, Kollenda B, Homescu A, Larsen P, Schuster F, Davi L, Sadeghi A-R, Holz T, Franz M.  2016.  Subversive-C: Abusing and Protecting Dynamic Message Dispatch. 2016 USENIX Annual Technical Conference (USENIX ATC 16). :209--221.
Krombholz K, Hupperich T, Holz T.  2016.  Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). :207--219.
2014
Vogl S, Gawlik R, Garmany B, Kittel T, Pfoh J, Eckert C, Holz T.  2014.  Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data. 23rd USENIX Security Symposium (USENIX Security 14). :813--328.
Kührer M, Hupperich T, Rossow C, Holz T.  2014.  Exit from Hell? Reducing the Impact of Amplification DDoS Attacks 23rd USENIX Security Symposium (USENIX Security 14). :111--125.
Kührer M, Hupperich T, Rossow C, Holz T.  2014.  Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Dahse J, Holz T.  2014.  Static Detection of Second-Order Vulnerabilities in Web Applications. 23rd USENIX Security Symposium (USENIX Security 14). :989--1003.
2012
Stringhini G, Egele M, Zarras A, Holz T, Kruegel C, Vigna G.  2012.  B@bel: Leveraging Email Delivery for Spam Mitigation. 21st USENIX Security Symposium (USENIX Security 12). :16--32.
Büscher A, Holz T.  2012.  Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).

Pages