Marius Muench

Orcid: 0000-0002-3393-5123

According to our database1, Marius Muench authored at least 13 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Forming Faster Firmware Fuzzers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
SoC Security Evaluation: Reflections on Methodology and Tooling.
IEEE Des. Test, 2021

SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2019
Dynamic binary firmware analysis: challenges & solutions. (Analyse dynamique de micrologiciels binaires: défis et solutions).
PhD thesis, 2019

Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016


  Loading...