Tim Blazytko
Title
Cited by
Cited by
Year
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
242019
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 643-659, 2017
172017
{GRIMOIRE}: Synthesizing Structure while Fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1985-2002, 2019
92019
Towards automated discovery of crash-resistant primitives in binary executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
82017
Towards Automated Generation of Exploitation Primitives for Web Browsers
B Garmany, M Stoffel, R Gawlik, P Koppe, T Blazytko, T Holz
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
12018
Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
T Blazytko, M Contag, C Aschermann, T Holz
1
Angriffsszenarien auf Microsoft Windows
T Blazytko
Die Datenschleuder, 2008
2008
The system can't perform the operation now. Try again later.
Articles 1–7