Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Moritz Schloegel"'
Autor:
Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Scharnowski, Tobias, Bars, Nils, Moritz Schloegel, Thorsten Holz, Abbasi, Ali, Gustafson, Eric, Muench, Marius, Vigna, Giovanni, Kruegel, Christopher
Publikováno v:
Scharnowski, T, Bars, N, Schloegel, M, Gustafson, E, Muench, M, Vigna, G, Kruegel, C, Holz, T & Abbasi, A 2022, Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing . in Proceedings of the 31st USENIX Security Symposium, Security 2022 . USENIX Association, pp. 1239-1256, 31st USENIX Security Symposium, Security 2022, Boston, United States, 10/08/22 . < https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski >
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive target for adversaries. Despite their high value and large attack surface, applying automated testing techniques such as fuzzing is not straightforwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3ac179b5e400e73cbf75aa51d6249765
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884178
ESORICS (1)
ESORICS (1)
In the arms race between binary exploitation techniques and mitigation schemes, code-reuse attacks have been proven indispensable. Typically, one of the initial hurdles is that an attacker cannot execute their own code due to countermeasures such as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a5d64f97729be6663e5d102931c5e32
https://doi.org/10.1007/978-3-030-88418-5_11
https://doi.org/10.1007/978-3-030-88418-5_11
Autor:
Schiller, Nico, Chlosta, Merlin, Moritz Schloegel, Bars, Nils, Eisenhofer, Thorsten, Scharnowski, Tobias, Lea Schönherr, Thorsten Holz, Domke, Felix
Publikováno v:
Ruhr-Universität Bochum
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7aea9c5fdc7d526068fe1156aee475ea
https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf