Folgen
Cornelius Aschermann
Cornelius Aschermann
Ruhr University Bochum
Bestätigte E-Mail-Adresse bei hexgolems.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
3312019
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th USENIX security symposium (USENIX Security 17), 167-182, 2017
3302017
NAUTILUS: Fishing for Deep Bugs with Grammars.
C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert
NDSS, 2019
2432019
Analyzing Program Termination and Complexity Automatically with AProVE
J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ...
Journal of Automated Reasoning 58, 3-31, 2017
1692017
{ETHBMC}: A bounded model checker for smart contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2757-2774, 2020
1322020
IJON: Exploring Deep State Spaces via Fuzzing
C Aschermann, S Schumilo, A Abbasi, T Holz
1302020
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1132019
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th USENIX Security Symposium (USENIX Security 17), 643-659, 2017
1042017
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2597-2614, 2021
812021
Nyx-net: network fuzzing with incremental snapshots
S Schumilo, C Aschermann, A Jemmett, A Abbasi, T Holz
Proceedings of the Seventeenth European Conference on Computer Systems, 166-180, 2022
562022
{AURORA}: Statistical crash analysis for automated root cause explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 235-252, 2020
532020
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
27th Annual Network and Distributed System Security Symposium, NDSS, 2020
442020
{AntiFuzz}: Impeding Fuzzing Audits of Binary Executables
E Güler, C Aschermann, A Abbasi, T Holz
28th USENIX Security Symposium (USENIX Security 19), 1931-1947, 2019
362019
Automatically proving termination and memory safety for programs with pointer arithmetic
T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ...
Journal of Automated Reasoning 58, 33-65, 2017
352017
AProVE: Termination and Memory Safety of C Programs: (Competition Contribution)
T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl
International Conference on Tools and Algorithms for the Construction and …, 2015
302015
Loki: Hardening code obfuscation against automated attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022
252022
Lower bounds for runtime complexity of term rewriting
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
Journal of Automated Reasoning 59, 121-163, 2017
192017
Purple llama cyberseceval: A secure coding benchmark for language models
M Bhatt, S Chennabasappa, C Nikolaidis, S Wan, I Evtimov, D Gabi, ...
arXiv preprint arXiv:2312.04724, 2023
172023
Technical Report: Hardening Code Obfuscation Against Automated Attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
arXiv preprint arXiv:2106.08913, 2021
122021
Inferring lower bounds for runtime complexity
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
26th International Conference on Rewriting Techniques and Applications (RTA …, 2015
122015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20