Marcel Busch

Orcid: 0009-0007-6632-7355

According to our database1, Marcel Busch authored at least 17 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage.
Proceedings of the 34th USENIX Security Symposium, 2025

Hercules Droidot and the murder on the JNI Express.
Proceedings of the 34th USENIX Security Symposium, 2025

2024
EmbedFuzz: High Speed Fuzzing Through Transplantation.
CoRR, 2024

Exploiting Android's Hardened Memory Allocator.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

EL3XIR: Fuzzing COTS Secure Monitors.
Proceedings of the 33rd USENIX Security Symposium, 2024

GlobalConfusion: TrustZone Trusted Application 0-Days by Design.
Proceedings of the 33rd USENIX Security Symposium, 2024

Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones.
Proceedings of the 33rd USENIX Security Symposium, 2024

SyncEmu: Enabling Dynamic Analysis of Stateful Trusted Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2021
On the Security of ARM TrustZone-Based Trusted Execution Environments.
PhD thesis, 2021

One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption.
Digit. Investig., 2021

2020
Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Memory corruption attacks within Android TEEs: a case study based on OP-TEE.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
TEEMo: trusted peripheral monitoring for optical networks and beyond.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

2017
A Cloud-Based Compilation and Hardening Platform for Android Apps.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017


  Loading...