BibTeX records: Tim Blazytko

download as .bib file

@inproceedings{DBLP:conf/ccs/BernhardSSBH22,
  author       = {Lukas Bernhard and
                  Tobias Scharnowski and
                  Moritz Schloegel and
                  Tim Blazytko and
                  Thorsten Holz},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {JIT-Picking: Differential Fuzzing of JavaScript Engines},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {351--364},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560624},
  doi          = {10.1145/3548606.3560624},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BernhardSSBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RichardB22,
  author       = {Golden G. Richard III and
                  Tim Blazytko},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Checkmate '22: Research on offensive and defensive techniques in the
                  context of Man At The End {(MATE)} attacks},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3553--3554},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3564247},
  doi          = {10.1145/3548606.3564247},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RichardB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scored/Barr-SmithB0M22,
  author       = {Frederick Barr{-}Smith and
                  Tim Blazytko and
                  Richard Baker and
                  Ivan Martinovic},
  editor       = {Santiago Torres{-}Arias and
                  Marcela S. Melara and
                  Laurent Simon},
  title        = {Exorcist: Automated Differential Analysis to Detect Compromises in
                  Closed-Source Software Supply Chains},
  booktitle    = {Proceedings of the 2022 {ACM} Workshop on Software Supply Chain Offensive
                  Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA,
                  7 November 2022},
  pages        = {51--61},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560835.3564550},
  doi          = {10.1145/3560835.3564550},
  timestamp    = {Fri, 24 Nov 2023 19:40:37 +0100},
  biburl       = {https://dblp.org/rec/conf/scored/Barr-SmithB0M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchlogelBCABH022,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Julius Basler and
                  Thorsten Holz and
                  Ali Abbasi},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Loki: Hardening Code Obfuscation Against Automated Attacks},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3055--3073},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/schloegel},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchlogelBCABH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2022checkmate,
  editor       = {Golden G. Richard III and
                  Tim Blazytko},
  title        = {Proceedings of the 2022 {ACM} Workshop on Research on offensive and
                  defensive techniques in the context of Man At The End {(MATE)} attacks,
                  Los Angeles, CA, USA, 11 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560831},
  doi          = {10.1145/3560831},
  isbn         = {978-1-4503-9881-7},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2022checkmate.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchlogelBBHH21,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Julius Basler and
                  Fabian Hemmer and
                  Thorsten Holz},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {218--239},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_11},
  doi          = {10.1007/978-3-030-88418-5\_11},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SchlogelBBHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08913,
  author       = {Moritz Schloegel and
                  Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Julius Basler and
                  Thorsten Holz and
                  Ali Abbasi},
  title        = {Loki: Hardening Code Obfuscation Against Automated Attacks},
  journal      = {CoRR},
  volume       = {abs/2106.08913},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08913},
  eprinttype    = {arXiv},
  eprint       = {2106.08913},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Blazytko20,
  author       = {Tim Blazytko},
  title        = {Reasoning about software security via synthesized behavioral substitutes},
  school       = {Ruhr University Bochum, Germany},
  year         = {2020},
  url          = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/7580},
  urn          = {urn:nbn:de:hbz:294-75800},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Blazytko20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoSAAFWH20,
  author       = {Tim Blazytko and
                  Moritz Schl{\"{o}}gel and
                  Cornelius Aschermann and
                  Ali Abbasi and
                  Joel Frank and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{AURORA:} Statistical Crash Analysis for Automated Root Cause Explanation},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {235--252},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/blazytko},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoSAAFWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AschermannSBGH19,
  author       = {Cornelius Aschermann and
                  Sergej Schumilo and
                  Tim Blazytko and
                  Robert Gawlik and
                  Thorsten Holz},
  title        = {{REDQUEEN:} Fuzzing with Input-to-State Correspondence},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/redqueen-fuzzing-with-input-to-state-correspondence/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AschermannSBGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoASASWH19,
  author       = {Tim Blazytko and
                  Cornelius Aschermann and
                  Moritz Schl{\"{o}}gel and
                  Ali Abbasi and
                  Sergej Schumilo and
                  Simon W{\"{o}}rner and
                  Thorsten Holz},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{GRIMOIRE:} Synthesizing Structure while Fuzzing},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1985--2002},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/blazytko},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoASASWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GarmanySGKBH18,
  author       = {Behrad Garmany and
                  Martin Stoffel and
                  Robert Gawlik and
                  Philipp Koppe and
                  Tim Blazytko and
                  Thorsten Holz},
  title        = {Towards Automated Generation of Exploitation Primitives for Web Browsers},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {300--312},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274723},
  doi          = {10.1145/3274694.3274723},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GarmanySGKBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17,
  author       = {Benjamin Kollenda and
                  Enes G{\"{o}}ktas and
                  Tim Blazytko and
                  Philipp Koppe and
                  Robert Gawlik and
                  Radhesh Krishnan Konoth and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Thorsten Holz},
  title        = {Towards Automated Discovery of Crash-Resistant Primitives in Binary
                  Executables},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {189--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.58},
  doi          = {10.1109/DSN.2017.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlazytkoCAH17,
  author       = {Tim Blazytko and
                  Moritz Contag and
                  Cornelius Aschermann and
                  Thorsten Holz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Syntia: Synthesizing the Semantics of Obfuscated Code},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {643--659},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/blazytko},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlazytkoCAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics