Biblio

Export 18 results:
Filters: Author is Mathias Payer  [Clear All Filters]
2020
Wu J, Nan Y, Kumar V, Tian D, Bianchi A, Payer M, Xu D.  2020.  BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
Wu J, Nan Y, Kumar V, Payer M, Xu D.  2020.  BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :397--411.
Jeon Y, Han WH, Burow N, Payer M.  2020.  FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. 2020 USENIX Annual Technical Conference (USENIX ATC 20). :249--263.
Ispoglou K, Austin D, Mohan V, Payer M.  2020.  FuzzGen: Automatic Fuzzer Generation. 29th USENIX Security Symposium (USENIX Security 20). :2271--2287.
Clements AA, Gustafson E, Scharnowski T, Grosen P, Fritz D, Kruegel C, Vigna G, Bagchi S, Payer M.  2020.  HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. 29th USENIX Security Symposium (USENIX Security 20). :1201--1218.
Bhattacharyya A, Sánchez A, Koruyeh EM, Abu-Ghazaleh N, Song C, Payer M.  2020.  SpecROP: Speculative Exploitation of ROP Chains. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :1--16.
Peng H, Payer M.  2020.  USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. 29th USENIX Security Symposium (USENIX Security 20). :2559--2575.
2019
Tsai S-Y, Payer M, Zhang Y.  2019.  Pythia: Remote Oracles for the Masses. 28th USENIX Security Symposium (USENIX Security 19). :693--710.
2018
Clements AA, Almakhdhub NSaleh, Bagchi S, Payer M.  2018.  ACES: Automatic Compartments for Embedded Systems. 27th USENIX Security Symposium (USENIX Security 18). :65--82.
2017
Biswas P, Di Federico A, Carr SA, Rajasekaran P, Volckaert S, Na Y, Franz M, Payer M.  2017.  Venerable Variadic Vulnerabilities Vanquished. 26th USENIX Security Symposium (USENIX Security 17). :186--198.
2016
Ispoglou KK, Payer M.  2016.  malWASH: Washing Malware to Evade Dynamic Analysis. 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16).
2015
Barresi A, Razavi K, Payer M, Gross TR.  2015.  CAIN: Silently Breaking ASLR in the Cloud. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
Carlini N, Barresi A, Payer M, Wagner D, Gross TR.  2015.  Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 24th {USENIX} Security Symposium ({USENIX} Security 15). :161--176.
2014
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). :147--163.
Vijayakumar H, Ge X, Payer M, Jaeger T.  2014.  JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :973--988.
2013
Payer M, Bluntschli B, Gross TR.  2013.  DynSec: On-the-fly Code Rewriting and Repair. 5th Workshop on Hot Topics in Software Upgrades (HotSWUp 13).
Payer M, Kravina E, Gross TR.  2013.  Lightweight Memory Tracing. 2013 {USENIX} Annual Technical Conference ({USENIX} {ATC} 13). :115--126.