Moritz Contag
Moritz Contag
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level
V van der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
Security and Privacy (SP), 2016 IEEE Symposium on, 934-953, 2016
1122016
Evaluating the Effectiveness of Current Anti-ROP Defenses
F Schuster, T Tendyck, J Pewny, A Maaß, M Steegmanns, M Contag, ...
International Workshop on Recent Advances in Intrusion Detection, 88-108, 2014
992014
MARX: Uncovering Class Hierarchies in C++ Programs
A Pawlowski, M Contag, V van der Veen, C Ouwehand, T Holz, H Bos, ...
NDSS, 2017
342017
How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles
M Contag, G Li, A Pawlowski, F Domke, K Levchenko, T Holz, S Savage
IEEE Symposium on Security and Privacy, 2017
292017
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 643-659, 2017
192017
Probfuscation: an obfuscation approach using probabilistic control flows
A Pawlowski, M Contag, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2016
162016
On the weaknesses of function table randomization
M Contag, R Gawlik, A Pawlowski, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2018
12018
Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
T Blazytko, M Contag, C Aschermann, T Holz
1
Virtual Machine-based Fingerprinting Schemes
M Contag
9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 11, 0
The system can't perform the operation now. Try again later.
Articles 1–9