REDQUEEN: Fuzzing with Input-to-State Correspondence. C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz NDSS 19, 1-15, 2019 | 239 | 2019 |
Syntia: Synthesizing the Semantics of Obfuscated Code. T Blazytko, M Contag, C Aschermann, T Holz USENIX Security Symposium, 643-659, 2017 | 86 | 2017 |
GRIMOIRE: Synthesizing Structure while Fuzzing. T Blazytko, C Aschermann, M Schlögel, A Abbasi, S Schumilo, S Wörner, ... USENIX Security Symposium 19, 2019 | 80 | 2019 |
AURORA: Statistical crash analysis for automated root cause explanation T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ... Proceedings of the 29th USENIX Conference on Security Symposium, 235-252, 2020 | 35 | 2020 |
Towards automated discovery of crash-resistant primitives in binary executables B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 20 | 2017 |
Loki: Hardening code obfuscation against automated attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... 31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022 | 14 | 2022 |
Towards automated generation of exploitation primitives for web browsers B Garmany, M Stoffel, R Gawlik, P Koppe, T Blazytko, T Holz Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 10 | 2018 |
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis T Blazytko, M Contag Black Hat Asia. Mar 22, 2018 | 5 | 2018 |
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains M Schloegel, T Blazytko, J Basler, F Hemmer, T Holz Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 4 | 2021 |
Jit-Picking: Differential Fuzzing of JavaScript Engines L Bernhard, T Scharnowski, M Schloegel, T Blazytko, T Holz CCS, 2022 | 3 | 2022 |
Technical Report: Hardening Code Obfuscation Against Automated Attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... arXiv preprint arXiv:2106.08913, 2021 | 1 | 2021 |
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains F Barr-Smith, T Blazytko, R Baker, I Martinovic Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022 | | 2022 |
Checkmate'22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks GG Richard III, T Blazytko Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | | 2022 |
Reasoning about software security via synthesized behavioral substitutes T Blazytko Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2020 | | 2020 |
Angriffsszenarien auf Microsoft Windows T Blazytko Die Datenschleuder, 2008 | | 2008 |