Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Moritz Schloegel"'
Autor:
Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Scharnowski, Tobias, Bars, Nils, Moritz Schloegel, Thorsten Holz, Abbasi, Ali, Gustafson, Eric, Muench, Marius, Vigna, Giovanni, Kruegel, Christopher
Publikováno v:
Scharnowski, T, Bars, N, Schloegel, M, Gustafson, E, Muench, M, Vigna, G, Kruegel, C, Holz, T & Abbasi, A 2022, Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing . in Proceedings of the 31st USENIX Security Symposium, Security 2022 . USENIX Association, pp. 1239-1256, 31st USENIX Security Symposium, Security 2022, Boston, United States, 10/08/22 . < https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski >
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive target for adversaries. Despite their high value and large attack surface, applying automated testing techniques such as fuzzing is not straightforwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3ac179b5e400e73cbf75aa51d6249765
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884178
ESORICS (1)
ESORICS (1)
In the arms race between binary exploitation techniques and mitigation schemes, code-reuse attacks have been proven indispensable. Typically, one of the initial hurdles is that an attacker cannot execute their own code due to countermeasures such as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a5d64f97729be6663e5d102931c5e32
https://doi.org/10.1007/978-3-030-88418-5_11
https://doi.org/10.1007/978-3-030-88418-5_11
Autor:
Zhang, Xiaohan1 (AUTHOR) xhzhang1@sjtu.edu.cn, Zhang, Cen2 (AUTHOR) cen001@e.ntu.edu.sg, Li, Xinghua1 (AUTHOR) xhli1@mail.xidian.edu.cn, Du, Zhengjie3 (AUTHOR) dz1833006@smail.nju.edu.cn, Mao, Bing3 (AUTHOR) maobing@nju.edu.cn, Li, Yuekang2 (AUTHOR) yuekang.li@ntu.edu.sg, Zheng, Yaowen2 (AUTHOR) yaowen.zheng@ntu.edu.sg, Li, Yeting4 (AUTHOR) liyeting@iie.ac.cn, Pan, Li5 (AUTHOR) panli@sjtu.edu.cn, Liu, Yang2 (AUTHOR) yangliu@ntu.edu.sg, Deng, Robert6 (AUTHOR) robertdeng@smu.edu.sg
Publikováno v:
ACM Computing Surveys. Feb2025, Vol. 57 Issue 2, p1-36. 36p.
Autor:
Schiller, Nico, Chlosta, Merlin, Moritz Schloegel, Bars, Nils, Eisenhofer, Thorsten, Scharnowski, Tobias, Lea Schönherr, Thorsten Holz, Domke, Felix
Publikováno v:
Ruhr-Universität Bochum
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7aea9c5fdc7d526068fe1156aee475ea
https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf
Publikováno v:
ACM Transactions on Software Engineering & Methodology; May2024, Vol. 33 Issue 4, p1-26, 26p
Autor:
Martin J. Alperen
Foundations of Homeland Security and Emergency Management Complete guide to understanding homeland security law The newly revised and updated Third Edition of Foundations of Homeland Security and Emergency Management enables readers to develop a conc
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16–20, 2024. The 86 full papers presented in these
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmsta