Biblio

Export 20 results:
Filters: Author is Mathias Payer  [Clear All Filters]
2022
Bhattacharyya A, Tesic U, Payer M.  2022.  Midas: Systematic Kernel TOCTTOU Protection. 31st USENIX Security Symposium (USENIX Security 22). :107--124.
Wang F, Wu J, Nan Y, Aafer Y, Zhang X, Xu D, Payer M.  2022.  ProFactory: Improving IoT Security via Formalized Protocol Customization. 31st USENIX Security Symposium (USENIX Security 22). :3879--3896.
2020
Wu J, Nan Y, Kumar V, Tian D, Bianchi A, Payer M, Xu D.  2020.  BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. 14th USENIX Workshop on Offensive Technologies (WOOT 20).
Wu J, Nan Y, Kumar V, Payer M, Xu D.  2020.  BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :397--411.
Jeon Y, Han WH, Burow N, Payer M.  2020.  FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. 2020 USENIX Annual Technical Conference (USENIX ATC 20). :249--263.
Ispoglou K, Austin D, Mohan V, Payer M.  2020.  FuzzGen: Automatic Fuzzer Generation. 29th USENIX Security Symposium (USENIX Security 20). :2271--2287.
Clements AA, Gustafson E, Scharnowski T, Grosen P, Fritz D, Kruegel C, Vigna G, Bagchi S, Payer M.  2020.  HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. 29th USENIX Security Symposium (USENIX Security 20). :1201--1218.
Bhattacharyya A, Sánchez A, Koruyeh EM, Abu-Ghazaleh N, Song C, Payer M.  2020.  SpecROP: Speculative Exploitation of ROP Chains. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :1--16.
Peng H, Payer M.  2020.  USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. 29th USENIX Security Symposium (USENIX Security 20). :2559--2575.
2019
Tsai S-Y, Payer M, Zhang Y.  2019.  Pythia: Remote Oracles for the Masses. 28th USENIX Security Symposium (USENIX Security 19). :693--710.
2018
Clements AA, Almakhdhub NSaleh, Bagchi S, Payer M.  2018.  ACES: Automatic Compartments for Embedded Systems. 27th USENIX Security Symposium (USENIX Security 18). :65--82.
2017
Biswas P, Di Federico A, Carr SA, Rajasekaran P, Volckaert S, Na Y, Franz M, Payer M.  2017.  Venerable Variadic Vulnerabilities Vanquished. 26th USENIX Security Symposium (USENIX Security 17). :186--198.
2016
Ispoglou KK, Payer M.  2016.  malWASH: Washing Malware to Evade Dynamic Analysis. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
2015
Barresi A, Razavi K, Payer M, Gross TR.  2015.  CAIN: Silently Breaking ASLR in the Cloud. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
Carlini N, Barresi A, Payer M, Wagner D, Gross TR.  2015.  Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. 24th USENIX Security Symposium (USENIX Security 15). :161--176.
2014
Kuznetsov V, Szekeres L, Payer M, Candea G, Sekar R., Song D.  2014.  Code-Pointer Integrity. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). :147--163.
Vijayakumar H, Ge X, Payer M, Jaeger T.  2014.  JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 23rd USENIX Security Symposium (USENIX Security 14). :973--988.
2013
Payer M, Bluntschli B, Gross TR.  2013.  DynSec: On-the-fly Code Rewriting and Repair. 5th Workshop on Hot Topics in Software Upgrades (HotSWUp 13).
Payer M, Kravina E, Gross TR.  2013.  Lightweight Memory Tracing. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :115--126.