REDQUEEN: Fuzzing with Input-to-State Correspondence. C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz NDSS 19, 1-15, 2019 | 375 | 2019 |
{GRIMOIRE}: Synthesizing structure while fuzzing T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ... 28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019 | 124 | 2019 |
Syntia: Synthesizing the semantics of obfuscated code T Blazytko, M Contag, C Aschermann, T Holz 26th USENIX Security Symposium (USENIX Security 17), 643-659, 2017 | 106 | 2017 |
{AURORA}: Statistical crash analysis for automated root cause explanation T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ... 29th USENIX Security Symposium (USENIX Security 20), 235-252, 2020 | 59 | 2020 |
JIT-picking: Differential fuzzing of JavaScript engines L Bernhard, T Scharnowski, M Schloegel, T Blazytko, T Holz Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 36 | 2022 |
Loki: Hardening code obfuscation against automated attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... 31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022 | 32 | 2022 |
Towards automated discovery of crash-resistant primitives in binary executables B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 17 | 2017 |
Towards automated generation of exploitation primitives for web browsers B Garmany, M Stoffel, R Gawlik, P Koppe, T Blazytko, T Holz Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 15 | 2018 |
Technical Report: Hardening Code Obfuscation Against Automated Attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... arXiv preprint arXiv:2106.08913, 2021 | 12 | 2021 |
Towards automating code-reuse attacks using synthesized gadget chains M Schloegel, T Blazytko, J Basler, F Hemmer, T Holz Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 6 | 2021 |
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis T Blazytko, M Contag Black Hat Asia. Mar 22, 2018 | 6 | 2018 |
Exorcist: automated differential analysis to detect compromises in closed-source software supply chains F Barr-Smith, T Blazytko, R Baker, I Martinovic Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive …, 2022 | 5 | 2022 |
Checkmate'22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks GG Richard III, T Blazytko Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | | 2022 |
Reasoning about software security via synthesized behavioral substitutes T Blazytko Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2020 | | 2020 |
Angriffsszenarien auf Microsoft Windows T Blazytko Die Datenschleuder, 2008 | | 2008 |