
Mathias Payer
Person information
- affiliation: EPFL, Lausanne, Switzerland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j7]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j6]Ahmad Hazimeh, Adrian Herrera, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 49:1-49:29 (2020) - [c62]Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer:
µRAI: Securing Embedded Systems with Return Address Integrity. NDSS 2020 - [c61]Sushant Dinesh, Nathan Burow, Dongyan Xu, Mathias Payer:
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. IEEE Symposium on Security and Privacy 2020: 1497-1511 - [c60]Yuseok Jeon, Wookhyun Han, Nathan Burow, Mathias Payer:
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. USENIX Annual Technical Conference 2020: 249-263 - [c59]Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer:
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. USENIX Security Symposium 2020: 1201-1218 - [c58]Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer:
FuzzGen: Automatic Fuzzer Generation. USENIX Security Symposium 2020: 2271-2287 - [c57]Hui Peng, Mathias Payer:
USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. USENIX Security Symposium 2020: 2559-2575 - [c56]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020 - [i12]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i11]Ahmad Hazimeh, Adrian Herrera, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. CoRR abs/2009.01120 (2020) - [i10]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. CoRR abs/2009.11776 (2020)
2010 – 2019
- 2019
- [j5]Mathias Payer
:
The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes. IEEE Secur. Priv. 17(1): 78-82 (2019) - [c55]Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard E. Shrobe, Mathias Payer:
FirmFuzz: Automated IoT Firmware Introspection and Analysis. IoT S&P@CCS 2019: 15-21 - [c54]Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus:
SMoTherSpectre: Exploiting Speculative Execution through Port Contention. CCS 2019: 785-800 - [c53]Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu:
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. CODASPY 2019: 209-220 - [c52]Naif Saleh Almakhdhub, Abraham A. Clements, Mathias Payer, Saurabh Bagchi:
BenchIoT: A Security Benchmark for the Internet of Things. DSN 2019: 234-246 - [c51]Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul Yu:
Employing attack graphs for intrusion detection. NSPW 2019: 16-30 - [c50]Rouhollah Mahfouzi, Amir Aminifar, Soheil Samii, Mathias Payer, Petru Eles, Zebo Peng:
Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems. RTSS 2019: 93-106 - [c49]Nathan Burow, Xinping Zhang, Mathias Payer:
SoK: Shining Light on Shadow Stacks. IEEE Symposium on Security and Privacy 2019: 985-999 - [c48]Shin-Yeh Tsai, Mathias Payer, Yiying Zhang:
Pythia: Remote Oracles for the Masses. USENIX Security Symposium 2019: 693-710 - [i9]Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus:
SMoTherSpectre: exploiting speculative execution through port contention. CoRR abs/1903.01843 (2019) - [i8]Sumaya Almanee, Mathias Payer, Joshua Garcia:
Too Quiet in the Library: A Study of Native Third-Party Libraries in Android. CoRR abs/1911.09716 (2019) - 2018
- [c47]Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer:
CUP: Comprehensive User-Space Protection for C/C++. AsiaCCS 2018: 381-392 - [c46]Zhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer:
Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks. CCS 2018: 1455-1469 - [c45]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CCS 2018: 1868-1882 - [c44]Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer:
CFIXX: Object Type Integrity for C++. NDSS 2018 - [c43]Hui Peng, Yan Shoshitaishvili, Mathias Payer:
T-Fuzz: Fuzzing by Program Transformation. IEEE Symposium on Security and Privacy 2018: 697-710 - [c42]Abraham A. Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, Mathias Payer:
ACES: Automatic Compartments for Embedded Systems. USENIX Security Symposium 2018: 65-82 - [p2]Mathias Payer:
How memory safety violations enable exploitation of programs. The Continuing Arms Race 2018: 1-23 - [p1]Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song:
Code-pointer integrity. The Continuing Arms Race 2018: 81-116 - [e7]Mathias Payer, Awais Rashid, Jose M. Such:
Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Lecture Notes in Computer Science 10953, Springer 2018, ISBN 978-3-319-94495-1 [contents] - [i7]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CoRR abs/1805.04767 (2018) - [i6]Nathan Burow, Xinping Zhang, Mathias Payer:
Shining Light On Shadow Stacks. CoRR abs/1811.03165 (2018) - 2017
- [j4]Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer:
Control-Flow Integrity: Precision, Security, and Performance. ACM Comput. Surv. 50(1): 16:1-16:33 (2017) - [j3]Scott A. Carr, Francesco Logozzo, Mathias Payer:
Automatic Contract Insertion with CCBot. IEEE Trans. Software Eng. 43(8): 701-714 (2017) - [c41]Alessandro Di Federico, Mathias Payer, Giovanni Agosta:
rev.ng: a unified binary analysis framework to recover CFGs and function boundaries. CC 2017: 131-141 - [c40]Mathias Payer:
Control-Flow Hijacking: Are We Making Progress? AsiaCCS 2017: 4 - [c39]Daniele Midi, Mathias Payer, Elisa Bertino:
Memory Safety for Embedded Devices with nesCheck. AsiaCCS 2017: 127-139 - [c38]Scott A. Carr, Mathias Payer:
DataShield: Configurable Data Confidentiality and Integrity. AsiaCCS 2017: 193-204 - [c37]Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer:
HexType: Efficient Detection of Type Confusion Errors for C++. CCS 2017: 2373-2387 - [c36]Xinyang Ge, Mathias Payer, Trent Jaeger:
An Evil Copy: How the Loader Betrays You. NDSS 2017 - [c35]Abraham A. Clements, Naif Saleh Almakhdhub, Khaled S. Saab, Prashast Srivastava, Jinkyu Koo, Saurabh Bagchi, Mathias Payer:
Protecting Bare-Metal Embedded Systems with Privilege Overlays. IEEE Symposium on Security and Privacy 2017: 289-303 - [c34]Priyam Biswas, Alessandro Di Federico, Scott A. Carr, Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, Michael Franz, Mathias Payer:
Venerable Variadic Vulnerabilities Vanquished. USENIX Security Symposium 2017: 186-198 - [c33]Ahmed Hussein, Mathias Payer, Antony L. Hosking
, Christopher A. Vick:
One Process to Reap Them All: Garbage Collection as-a-Service. VEE 2017: 171-186 - [e6]Eric Bodden, Mathias Payer, Elias Athanasopoulos:
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Lecture Notes in Computer Science 10379, Springer 2017, ISBN 978-3-319-62104-3 [contents] - [e5]José M. Fernandez, Mathias Payer:
10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017. USENIX Association 2017 [contents] - [i5]Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer:
CUP: Comprehensive User-Space Protection for C/C++. CoRR abs/1704.05004 (2017) - 2016
- [c32]Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer:
Enforcing Least Privilege Memory Views for Multithreaded Applications. CCS 2016: 393-405 - [c31]Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank:
Forgery-Resistant Touch-based Authentication on Mobile Devices. AsiaCCS 2016: 499-510 - [c30]István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida
, Herbert Bos
, Erik van der Kouwe:
TypeSan: Practical Type Confusion Detection. CCS 2016: 517-528 - [c29]Mathias Payer:
HexPADS: A Platform to Detect "Stealth" Attacks. ESSoS 2016: 138-154 - [c28]Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. EuroS&P 2016: 179-194 - [c27]Chao Zhang, Dawn Song, Scott A. Carr, Mathias Payer, Tongxin Li, Yu Ding, Chengyu Song:
VTrust: Regaining Trust on Virtual Calls. NDSS 2016 - [c26]Andreas Follner, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos K. Ispoglou, Mathias Payer, Eric Bodden
:
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. STM 2016: 212-228 - [c25]Kyriakos K. Ispoglou, Mathias Payer:
malWASH: Washing Malware to Evade Dynamic Analysis. WOOT 2016 - [e4]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [e3]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba:
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4568-2 [contents] - [e2]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e1]Eric Eide, Mathias Payer:
9th Workshop on Cyber Security Experimentation and Test, CSET '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - [i4]Nathan Burow, Scott A. Carr, Stefan Brunthaler, Mathias Payer, Joseph Nash, Per Larsen, Michael Franz:
Control-Flow Integrity: Precision, Security, and Performance. CoRR abs/1602.04056 (2016) - 2015
- [j2]Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte, Mario Frank:
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications. IEEE Trans. Inf. Forensics Secur. 10(1): 200-212 (2015) - [c24]Mathias Payer, Antonio Barresi, Thomas R. Gross:
Fine-Grained Control-Flow Integrity Through Binary Hardening. DIMVA 2015: 144-164 - [c23]Ahmed Hussein, Antony L. Hosking
, Mathias Payer, Christopher A. Vick:
Don't race the memory bus: taming the GC leadfoot. ISMM 2015: 15-27 - [c22]Antonio Barresi, Mathias Payer, Thomas R. Gross:
Control-Flow Integrity. Software Engineering & Management 2015: 277 - [c21]Vijay D'Silva, Mathias Payer, Dawn Xiaodong Song:
The Correctness-Security Gap in Compiler Optimization. IEEE Symposium on Security and Privacy Workshops 2015: 73-87 - [c20]Ahmed Hussein, Mathias Payer, Antony L. Hosking
, Christopher A. Vick:
Impact of GC design on power and performance for Android. SYSTOR 2015: 13:1-13:12 - [c19]Nicholas Carlini, Antonio Barresi, Mathias Payer, David A. Wagner, Thomas R. Gross:
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. USENIX Security Symposium 2015: 161-176 - [c18]Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross:
CAIN: Silently Breaking ASLR in the Cloud. WOOT 2015 - [i3]Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank:
Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices. CoRR abs/1506.02294 (2015) - 2014
- [j1]Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar:
Eternal War in Memory. IEEE Secur. Priv. 12(3): 45-53 (2014) - [c17]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c16]Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song:
Code-Pointer Integrity. OSDI 2014: 147-163 - [c15]Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. USENIX Security Symposium 2014: 973-988 - [i2]Mathias Payer, Antonio Barresi, Thomas R. Gross:
Lockdown: Dynamic Control-Flow Integrity. CoRR abs/1407.0549 (2014) - [i1]Mathias Payer, Stephen Crane, Per Larsen, Stefan Brunthaler, Richard Wartell, Michael Franz:
Similarity-based matching meets Malware Diversity. CoRR abs/1409.7760 (2014) - 2013
- [c14]Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song:
HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism. ESORICS 2013: 164-181 - [c13]Mathias Payer, Boris Bluntschli, Thomas R. Gross:
DynSec: On-the-fly Code Rewriting and Repair. HotSWUp 2013 - [c12]Mathias Payer, Thomas R. Gross:
String oriented programming: when ASLR is not enough. PPREW@POPL 2013: 2:1-2:9 - [c11]Mathias Payer, Thomas R. Gross:
Hot-patching a web server: A case study of ASAP code repair. PST 2013: 143-150 - [c10]Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song:
SoK: Eternal War in Memory. IEEE Symposium on Security and Privacy 2013: 48-62 - [c9]Mathias Payer, Enrico Kravina, Thomas R. Gross:
Lightweight Memory Tracing. USENIX Annual Technical Conference 2013: 115-126 - 2012
- [c8]Mathias Payer, Boris Bluntschli, Thomas R. Gross:
LLDSAL: a low-level domain-specific aspect language for dynamic code-generation and program modification. DSAL@AOSD 2012: 15-20 - [c7]Mathias Payer, Tobias Hartmann, Thomas R. Gross:
Safe Loading - A Foundation for Secure Execution of Untrusted Programs. IEEE Symposium on Security and Privacy 2012: 18-32 - [c6]Mathias Payer, Thomas R. Gross:
Protecting applications against TOCTTOU races by user-space caching of file metadata. VEE 2012: 215-226 - 2011
- [c5]Mathias Payer, Thomas R. Gross:
Performance evaluation of adaptivity in software transactional memory. ISPASS 2011: 165-174 - [c4]Mathias Payer, Thomas R. Gross:
Fine-grained user-space security through virtualization. VEE 2011: 157-168 - 2010
- [c3]Mathias Payer:
Usage scenarios for fast dynamic binary translators. SYSTOR 2010 - [c2]Mathias Payer, Thomas R. Gross:
Generating low-overhead dynamic binary translators. SYSTOR 2010
2000 – 2009
- 2007
- [c1]Florian T. Schneider, Mathias Payer, Thomas R. Gross:
Online optimizations driven by hardware performance monitoring. PLDI 2007: 373-382
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-22 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint