Follow
Tim Blazytko
Title
Cited by
Cited by
Year
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
2392019
Syntia: Synthesizing the Semantics of Obfuscated Code.
T Blazytko, M Contag, C Aschermann, T Holz
USENIX Security Symposium, 643-659, 2017
862017
GRIMOIRE: Synthesizing Structure while Fuzzing.
T Blazytko, C Aschermann, M Schlögel, A Abbasi, S Schumilo, S Wörner, ...
USENIX Security Symposium 19, 2019
802019
AURORA: Statistical crash analysis for automated root cause explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
Proceedings of the 29th USENIX Conference on Security Symposium, 235-252, 2020
352020
Towards automated discovery of crash-resistant primitives in binary executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
202017
Loki: Hardening code obfuscation against automated attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022
142022
Towards automated generation of exploitation primitives for web browsers
B Garmany, M Stoffel, R Gawlik, P Koppe, T Blazytko, T Holz
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
102018
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
T Blazytko, M Contag
Black Hat Asia. Mar 22, 2018
52018
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
M Schloegel, T Blazytko, J Basler, F Hemmer, T Holz
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
42021
Jit-Picking: Differential Fuzzing of JavaScript Engines
L Bernhard, T Scharnowski, M Schloegel, T Blazytko, T Holz
CCS, 2022
32022
Technical Report: Hardening Code Obfuscation Against Automated Attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
arXiv preprint arXiv:2106.08913, 2021
12021
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains
F Barr-Smith, T Blazytko, R Baker, I Martinovic
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022
2022
Checkmate'22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks
GG Richard III, T Blazytko
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
2022
Reasoning about software security via synthesized behavioral substitutes
T Blazytko
Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2020
2020
Angriffsszenarien auf Microsoft Windows
T Blazytko
Die Datenschleuder, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–15