Moritz Contag
Moritz Contag
Verified email at - Homepage
Cited by
Cited by
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level
V van der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
Security and Privacy (SP), 2016 IEEE Symposium on, 934-953, 2016
Evaluating the Effectiveness of Current Anti-ROP Defenses
F Schuster, T Tendyck, J Pewny, A Maaß, M Steegmanns, M Contag, ...
International Workshop on Recent Advances in Intrusion Detection, 88-108, 2014
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th USENIX Security Symposium (USENIX Security 17), 643-659, 2017
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles
M Contag, G Li, A Pawlowski, F Domke, K Levchenko, T Holz, S Savage
IEEE Symposium on Security and Privacy, 2017
MARX: Uncovering Class Hierarchies in C++ Programs
A Pawlowski, M Contag, V van der Veen, C Ouwehand, T Holz, H Bos, ...
NDSS, 2017
Probfuscation: an obfuscation approach using probabilistic control flows
A Pawlowski, M Contag, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2016
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
T Blazytko, M Contag
Black Hat Asia. Mar 22, 2018
Loki: Hardening code obfuscation against automated attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022
On the weaknesses of function table randomization
M Contag, R Gawlik, A Pawlowski, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2018
A Tough call
V van der Veen, E Göktaş, M Contag, A Pawlowski, TH RUB, X Chen, ...
Virtual Machine-based Fingerprinting Schemes
M Contag
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 11, 0
The system can't perform the operation now. Try again later.
Articles 1–11