Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tim Blazytko
@inproceedings{DBLP:conf/ccs/BernhardSSBH22, author = {Lukas Bernhard and Tobias Scharnowski and Moritz Schloegel and Tim Blazytko and Thorsten Holz}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {JIT-Picking: Differential Fuzzing of JavaScript Engines}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {351--364}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560624}, doi = {10.1145/3548606.3560624}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BernhardSSBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RichardB22, author = {Golden G. Richard III and Tim Blazytko}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End {(MATE)} attacks}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3553--3554}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3564247}, doi = {10.1145/3548606.3564247}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RichardB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scored/Barr-SmithB0M22, author = {Frederick Barr{-}Smith and Tim Blazytko and Richard Baker and Ivan Martinovic}, editor = {Santiago Torres{-}Arias and Marcela S. Melara and Laurent Simon}, title = {Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains}, booktitle = {Proceedings of the 2022 {ACM} Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA, 7 November 2022}, pages = {51--61}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560835.3564550}, doi = {10.1145/3560835.3564550}, timestamp = {Fri, 24 Nov 2023 19:40:37 +0100}, biburl = {https://dblp.org/rec/conf/scored/Barr-SmithB0M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchlogelBCABH022, author = {Moritz Schloegel and Tim Blazytko and Moritz Contag and Cornelius Aschermann and Julius Basler and Thorsten Holz and Ali Abbasi}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Loki: Hardening Code Obfuscation Against Automated Attacks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3055--3073}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/schloegel}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchlogelBCABH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2022checkmate, editor = {Golden G. Richard III and Tim Blazytko}, title = {Proceedings of the 2022 {ACM} Workshop on Research on offensive and defensive techniques in the context of Man At The End {(MATE)} attacks, Los Angeles, CA, USA, 11 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560831}, doi = {10.1145/3560831}, isbn = {978-1-4503-9881-7}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2022checkmate.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SchlogelBBHH21, author = {Moritz Schloegel and Tim Blazytko and Julius Basler and Fabian Hemmer and Thorsten Holz}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {218--239}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_11}, doi = {10.1007/978-3-030-88418-5\_11}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SchlogelBBHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08913, author = {Moritz Schloegel and Tim Blazytko and Moritz Contag and Cornelius Aschermann and Julius Basler and Thorsten Holz and Ali Abbasi}, title = {Loki: Hardening Code Obfuscation Against Automated Attacks}, journal = {CoRR}, volume = {abs/2106.08913}, year = {2021}, url = {https://arxiv.org/abs/2106.08913}, eprinttype = {arXiv}, eprint = {2106.08913}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Blazytko20, author = {Tim Blazytko}, title = {Reasoning about software security via synthesized behavioral substitutes}, school = {Ruhr University Bochum, Germany}, year = {2020}, url = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/7580}, urn = {urn:nbn:de:hbz:294-75800}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Blazytko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoSAAFWH20, author = {Tim Blazytko and Moritz Schl{\"{o}}gel and Cornelius Aschermann and Ali Abbasi and Joel Frank and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{AURORA:} Statistical Crash Analysis for Automated Root Cause Explanation}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {235--252}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/blazytko}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoSAAFWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AschermannSBGH19, author = {Cornelius Aschermann and Sergej Schumilo and Tim Blazytko and Robert Gawlik and Thorsten Holz}, title = {{REDQUEEN:} Fuzzing with Input-to-State Correspondence}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/redqueen-fuzzing-with-input-to-state-correspondence/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AschermannSBGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoASASWH19, author = {Tim Blazytko and Cornelius Aschermann and Moritz Schl{\"{o}}gel and Ali Abbasi and Sergej Schumilo and Simon W{\"{o}}rner and Thorsten Holz}, editor = {Nadia Heninger and Patrick Traynor}, title = {{GRIMOIRE:} Synthesizing Structure while Fuzzing}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1985--2002}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/blazytko}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoASASWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18, author = {Behrad Garmany and Martin Stoffel and Robert Gawlik and Philipp Koppe and Tim Blazytko and Thorsten Holz}, title = {Towards Automated Generation of Exploitation Primitives for Web Browsers}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {300--312}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274723}, doi = {10.1145/3274694.3274723}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17, author = {Benjamin Kollenda and Enes G{\"{o}}ktas and Tim Blazytko and Philipp Koppe and Robert Gawlik and Radhesh Krishnan Konoth and Cristiano Giuffrida and Herbert Bos and Thorsten Holz}, title = {Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {189--200}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.58}, doi = {10.1109/DSN.2017.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazytkoCAH17, author = {Tim Blazytko and Moritz Contag and Cornelius Aschermann and Thorsten Holz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Syntia: Synthesizing the Semantics of Obfuscated Code}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {643--659}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/blazytko}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlazytkoCAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.