Zobrazeno 1 - 10
of 181
pro vyhledávání: '"Thorsten Holz"'
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Autor:
Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Scharnowski, Tobias, Bars, Nils, Moritz Schloegel, Thorsten Holz, Abbasi, Ali, Gustafson, Eric, Muench, Marius, Vigna, Giovanni, Kruegel, Christopher
Publikováno v:
Scharnowski, T, Bars, N, Schloegel, M, Gustafson, E, Muench, M, Vigna, G, Kruegel, C, Holz, T & Abbasi, A 2022, Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing . in Proceedings of the 31st USENIX Security Symposium, Security 2022 . USENIX Association, pp. 1239-1256, 31st USENIX Security Symposium, Security 2022, Boston, United States, 10/08/22 . < https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski >
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
Proceedings of the 31st USENIX Security Symposium, Security 2022, 1239-1256
STARTPAGE=1239;ENDPAGE=1256;TITLE=Proceedings of the 31st USENIX Security Symposium, Security 2022
Ruhr-Universität Bochum
As embedded devices are becoming more pervasive in our everyday lives, they turn into an attractive target for adversaries. Despite their high value and large attack surface, applying automated testing techniques such as fuzzing is not straightforwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3ac179b5e400e73cbf75aa51d6249765
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce
Autor:
Nurullah Demir, Matteo Große-Kampmann, Tobias Urban, Christian Wressnegger, Thorsten Holz, Norbert Pohlmann
Publikováno v:
Proceedings of the ACM Web Conference 2022.
Autor:
Inmaculada de la Torre, Ennio Lubrano, Rieke Alten, Lars Erik Kristensen, Baojin Zhu, Dennis G McGonagle, Jacques Morel, Vinod Chandran, Marcus Ngantcha, William Tillett, Walid Fakhouri, Nicola Gullick, Khai Jing Ng, Àngels Martinez Ferrer, Dominika Kennedy, Thorsten Holzkämper, Andris Kronbergs
Publikováno v:
RMD Open, Vol 10, Iss 3 (2024)
Background The psoriatic arthritis (PsA) Observational Study of Persistence of Treatment (PRO-SPIRIT) assesses effectiveness and persistence of real-world PsA treatments. Ixekizumab (IXE) is an interleukin (IL)-17A inhibitor (i) (IL-17Ai), approved f
Externí odkaz:
https://doaj.org/article/9fab36e7fb9744a09f21d6da08fe35fa
Publikováno v:
Schumilo, S, Aschermann, C, Jemmett, A, Abbasi, A & Holz, T 2022, Nyx-Net: Network Fuzzing with Incremental Snapshots . in EuroSys '22 : Proceedings of the Seventeenth European Conference on Computer Systems . Association for Computing Machinery, Inc, pp. 166-180, 17th European Conference on Computer Systems, EuroSys 2022, Rennes, France, 5/04/22 . https://doi.org/10.1145/3492321.3519591
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer Systems, 166-180
STARTPAGE=166;ENDPAGE=180;TITLE=EuroSys '22
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer Systems, 166-180
STARTPAGE=166;ENDPAGE=180;TITLE=EuroSys '22
Coverage-guided fuzz testing ("fuzzing") has become mainstream and we have observed lots of progress in this research area recently. However, it is still challenging to efficiently test network services with existing coverage-guided fuzzing methods.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcd865ae2bd3caeb553aa4d9d5456308
http://arxiv.org/abs/2111.03013
http://arxiv.org/abs/2111.03013
Publikováno v:
RAID
Email is still one of the most common ways of communication in our digital world, the underlying Simple Mail Transport Protocol (SMTP) is crucial for our information society. Back when SMTP was developed, security goals for the exchanged messages did
Autor:
Terry Benzel, Thorsten Holz
Publikováno v:
IEEE Security & Privacy. 20:8-9
Publikováno v:
WISEC
Mobile networks are a crucial part of our digital lives and require adequate security measures. The 4G and 5G network standards are complex and challenging to implement, which led to several implementation issues being discovered over the last years.