


default search action
28th USENIX Security Symposium 2019: Santa Clara, CA, USA
- Nadia Heninger, Patrick Traynor:

28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019. USENIX Association 2019
Wireless Security
- Pallavi Sivakumaran, Jorge Blasco:

A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape. 1-18 - Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 19-36 - Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick:

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. 37-54 - Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim:

Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. 55-72 - Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. 73-88
Protecting Users Everywhere
- Christine Chen, Nicola Dell, Franziska Roesner:

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. 89-104 - Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:

Clinical Computer Security for Victims of Intimate Partner Violence. 105-122 - Noah J. Apthorpe, Sarah Varghese, Nick Feamster:

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA. 123-140 - Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:

Secure Multi-User Content Sharing for Augmented Reality Applications. 141-158 - Eric Zeng, Franziska Roesner:

Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. 159-176
Hardware Security
- Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. 177-194 - Mustakimur Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang:

Origin-sensitive Control Flow Integrity. 195-211 - Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:

HardFails: Insights into Software-Exploitable Hardware Bugs. 213-230 - Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek:

uXOM: Efficient eXecute-Only Memory on ARM Cortex-M. 231-247 - Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:

A Systematic Evaluation of Transient Execution Attacks and Defenses. 249-266
Machine Learning Applications
- Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song:

The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. 267-284 - Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. 285-302 - Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. 303-320 - Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks. 321-338 - Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags:

Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography. 339-356
Planes, Cars, and Robots
- Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan

, Guevara Noubir:
Wireless Attacks on Aircraft Instrument Landing Systems. 357-372 - Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman:

Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers. 373-388 - Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar:

CANvas: Fast and Inexpensive Automotive Network Mapping. 389-405 - Richard Baker, Ivan Martinovic:

Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. 407-424 - Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:

RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. 425-442
Machine Learning, Adversarial and Otherwise
- Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:

Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. 443-460 - Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. 461-478 - Erwin Quiring, Alwin Maier, Konrad Rieck:

Misleading Authorship Attribution of Source Code using Adversarial Learning. 479-496 - Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras:

Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. 497-514 - Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. 515-532
Mobile Security 1
- Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel:

simTPM: User-centric TPM for Mobile Devices. 533-550 - Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:

The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. 551-566 - Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. 567-584 - Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie:

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. 585-602 - Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman:

50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. 603-620
Side Channels
- Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. 621-637 - Anatoly Shusterman

, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. 639-656 - Shuai Wang, Yuyan Bao

, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. 657-674 - Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard:

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. 675-692 - Shin-Yeh Tsai, Mathias Payer, Yiying Zhang:

Pythia: Remote Oracles for the Masses. 693-710
Mobile Security 2
- Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin

, Jean-Pierre Hubaux:
HideMyApp: Hiding the Presence of Sensitive Apps on Android. 711-728 - Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. 729-746 - Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. 747-764 - Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:

Understanding iOS-based Crowdturfing Through Hidden UI Analysis. 765-781
Crypto Means Cryptocurrencies
- Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:

BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. 783-800 - Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:

FastKitten: Practical Smart Contracts on Bitcoin. 801-818 - Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:

StrongChain: Transparent and Collaborative Proof-of-Work Consensus. 819-836 - Haaroon Yousaf, George Kappos, Sarah Meiklejohn:

Tracing Transactions Across Cryptocurrency Ledgers. 837-850
Intelligence and Vulnerabilities
- Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:

Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 851-867 - Ying Dong, Wenbo Guo

, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. 869-885 - Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. 887-903 - Yun Shen, Gianluca Stringhini:

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. 905-921
Web Attacks
- Cristian-Alexandru Staicu, Michael Pradel:

Leaky Images: Targeted Privacy Attacks in the Web. 923-939 - Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:

All Your Clicks Belong to Me: Investigating Click Interception on the Web. 941-957 - John V. Monaco:

What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete. 959-976 - Guangliang Yang, Jeff Huang, Guofei Gu:

Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities. 977-994 - Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel:

Small World with High Risks: A Study of Security Threats in the npm Ecosystem. 995-1010
Crypto Means Cryptographic Attacks
- Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk:

"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails. 1011-1028 - Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt:

Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. 1029-1046 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:

The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. 1047-1061 - Amit Klein, Benny Pinkas:

From IP ID to Device ID and KASLR Bypass. 1063-1080 - Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye:

When the Signal is in the Noise: Exploiting Diffix's Sticky Noise. 1081-1098
IoT Security
- Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. 1099-1114 - Bing Huang, Alvaro A. Cárdenas, Ross Baldick:

Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks. 1115-1132 - Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:

Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. 1133-1150 - Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:

Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. 1151-1167 - Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric:

All Things Considered: An Analysis of IoT Devices on Home Networks. 1169-1185
OS Security
- Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou:

KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. 1187-1204 - Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang:

PeX: A Permission Check Analysis Framework for Linux Kernel. 1205-1220 - Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg:

ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). 1221-1238 - Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. 1239-1256 - Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. 1257-1272
Phishing and Scams
- Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:

Detecting and Characterizing Lateral Phishing at Scale. 1273-1290 - Asaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin:

High Precision Detection of Business Email Compromise. 1291-1307 - Amber van der Heijden, Luca Allodi:

Cognitive Triaging of Phishing Attacks. 1309-1326 - Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:

Users Really Do Answer Telephone Scams. 1327-1340 - Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. 1341-1356
Distributed System Security + Verifying Hardware
- Shih-Wei Li, John S. Koh, Jason Nieh:

Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. 1357-1374 - Michael P. Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa:

WAVE: A Decentralized Authorization Framework with Transitive Delegation. 1375-1392 - Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos:

in-toto: Providing farm-to-table guarantees for bits and bytes. 1393-1410 - Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala:

IODINE: Verifying Constant-Time Execution of Hardware. 1411-1428 - Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. 1429-1446
Crypto Means Cryptography
- Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:

Mobile Private Contact Discovery at Scale. 1447-1464 - Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi

, Jonathan Protzenko:
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats. 1465-1482 - R. Joseph Connor, Max Schuchard:

Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips. 1483-1500 - M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar

:
XONN: XNOR-based Oblivious Deep Neural Network Inference. 1501-1518 - Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler:

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. 1519-1536
Passwords
- Ding Wang, Ping Wang, Debiao He, Yuan Tian:

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. 1537-1555 - Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:

Protecting accounts from credential stuffing with password breach alerting. 1556-1571 - Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:

Probability Model Transforming Encoders Against Encoding Attacks. 1573-1590
Cryptocurrency Scams
- Christof Ferreira Torres, Mathis Steichen, Radu State:

The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. 1591-1607 - Jiahua Xu, Benjamin Livshits:

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme. 1609-1625 - Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr:

Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. 1627-1644
Web Defenses
- Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang:

Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting. 1645-1660 - Charles Reis, Alexander Moshchuk, Nasko Oskov:

Site Isolation: Process Separation for Web Sites within the Browser. 1661-1678 - Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé:

Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. 1679-1696 - Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis:

Less is More: Quantifying the Security Benefits of Debloating Web Applications. 1697-1714 - Christopher Thompson, Martin Shelton, Emily Stark, Max Walker, Emily Schechter, Adrienne Porter Felt:

The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators. 1715-1732
Software Security
- Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:

RAZOR: A Framework for Post-deployment Software Debloating. 1733-1750 - Fabio Pagani, Davide Balzarotti:

Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques. 1751-1768 - Kangjie Lu, Aditya Pakki, Qiushi Wu:

Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. 1769-1786 - Wenbo Guo

, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song:
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 1787-1804 - Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:

CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. 1805-1821
Privacy
- Rob Jansen, Tavish Vaidya, Micah Sherr:

Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. 1823-1840 - Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:

No Right to Remain Silent: Isolating Malicious Mixes. 1841-1858 - Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso:

On (The Lack Of) Location Privacy in Crowdsourcing Applications. 1859-1876 - Takao Murakami, Yusuke Kawamoto:

Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation. 1877-1894 - Bargav Jayaraman, David Evans:

Evaluating Differentially Private Machine Learning in Practice. 1895-1912
Fuzzing
- Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:

Fuzzification: Anti-Fuzzing Techniques. 1913-1930 - Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz:

AntiFuzz: Impeding Fuzzing Audits of Binary Executables. 1931-1947 - Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah:

MOPT: Optimized Mutation Scheduling for Fuzzers. 1949-1966 - Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su

:
EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. 1967-1983 - Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz:

GRIMOIRE: Synthesizing Structure while Fuzzing. 1985-2002

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














