Mathias Payer

Orcid: 0000-0001-5054-7547

Affiliations:
  • EPFL, Lausanne, Switzerland


According to our database1, Mathias Payer authored at least 127 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing.
Proc. Priv. Enhancing Technol., January, 2024

2023
DatAFLow: Toward a Data-Flow-Guided Fuzzer.
ACM Trans. Softw. Eng. Methodol., September, 2023

Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs.
J. Hardw. Syst. Secur., September, 2023

Top of the Heap: Efficient Memory Error Protection for Many Heap Objects.
CoRR, 2023

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
CoRR, 2023

FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Proceedings of the 32nd USENIX Security Symposium, 2023

Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering.
Proceedings of the 32nd USENIX Security Symposium, 2023

GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation.
Proceedings of the 32nd USENIX Security Symposium, 2023

ACTOR: Action-Guided Kernel Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

ARMore: Pushing Love Back Into Binaries.
Proceedings of the 32nd USENIX Security Symposium, 2023

WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

ViDeZZo: Dependency-aware Virtual Device Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

TEEzz: Fuzzing Trusted Applications on COTS Android Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SecureCells: A Secure Compartmentalized Architecture.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Imprecise Store Exceptions.
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023

Creating Trust by Abolishing Hierarchies.
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023

Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

FishFuzz: Throwing Larger Nets to Catch Deeper Bugs.
CoRR, 2022

PACSan: Enforcing Memory Safety Based on ARM PA.
CoRR, 2022

Deploying decentralized, privacy-preserving proximity tracing.
Commun. ACM, 2022

Midas: Systematic Kernel TOCTTOU Protection.
Proceedings of the 31st USENIX Security Symposium, 2022

ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Minerva: browser API fuzzing with dynamic mod-ref analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Preventing Kernel Hacks with HAKCs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

The Taming of the Stack: Isolating Stack Data from Memory Errors.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Evocatio: Conjuring Bug Capabilities from a Single PoC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Designing a Provenance Analysis for SGX Enclaves.
Proceedings of the Annual Computer Security Applications Conference, 2022

One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Secure Compilation (Dagstuhl Seminar 21481).
Dagstuhl Reports, 2021

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Evading Voltage-Based Intrusion Detection on Automotive CAN.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Principal Kernel Analysis: A Tractable Methodology to Simulate Scaled GPU Workloads.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Gramatron: effective grammar-aware fuzzing.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Seed selection for successful fuzzing.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Rebooting Virtual Memory with Midgard.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Code Specialization through Dynamic Feature Observation.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Igor: Crash Deduplication Through Root-Cause Clustering.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Enclosure: language-based restriction of untrusted libraries.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Magma: A Ground-Truth Fuzzing Benchmark.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

FuzzGen: Automatic Fuzzer Generation.
Proceedings of the 29th USENIX Security Symposium, 2020

HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

FuZZan: Efficient Sanitizer Metadata Design for Fuzzing.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

SpecROP: Speculative Exploitation of ROP Chains.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

µRAI: Securing Embedded Systems with Return Address Integrity.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes.
IEEE Secur. Priv., 2019

Too Quiet in the Library: A Study of Native Third-Party Libraries in Android.
CoRR, 2019

Pythia: Remote Oracles for the Masses.
Proceedings of the 28th USENIX Security Symposium, 2019

SoK: Shining Light on Shadow Stacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems.
Proceedings of the IEEE Real-Time Systems Symposium, 2019

Employing attack graphs for intrusion detection.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

BenchIoT: A Security Benchmark for the Internet of Things.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

FirmFuzz: Automated IoT Firmware Introspection and Analysis.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Shining Light On Shadow Stacks.
CoRR, 2018

ACES: Automatic Compartments for Embedded Systems.
Proceedings of the 27th USENIX Security Symposium, 2018

T-Fuzz: Fuzzing by Program Transformation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

CFIXX: Object Type Integrity for C++.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Block Oriented Programming: Automating Data-Only Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

CUP: Comprehensive User-Space Protection for C/C++.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

How memory safety violations enable exploitation of programs.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

Code-pointer integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Automatic Contract Insertion with CCBot.
IEEE Trans. Software Eng., 2017

Control-Flow Integrity: Precision, Security, and Performance.
ACM Comput. Surv., 2017

One Process to Reap Them All: Garbage Collection as-a-Service.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

Venerable Variadic Vulnerabilities Vanquished.
Proceedings of the 26th USENIX Security Symposium, 2017

Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

An Evil Copy: How the Loader Betrays You.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Control-Flow Hijacking: Are We Making Progress?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Memory Safety for Embedded Devices with nesCheck.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

HexType: Efficient Detection of Type Confusion Errors for C++.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

DataShield: Configurable Data Confidentiality and Integrity.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

rev.ng: a unified binary analysis framework to recover CFGs and function boundaries.
Proceedings of the 26th International Conference on Compiler Construction, 2017

2016
malWASH: Washing Malware to Evade Dynamic Analysis.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

VTrust: Regaining Trust on Virtual Calls.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Fine-Grained Control-Flow Integrity for Kernel Software.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

HexPADS: A Platform to Detect "Stealth" Attacks.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Enforcing Least Privilege Memory Views for Multithreaded Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

TypeSan: Practical Type Confusion Detection.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Forgery-Resistant Touch-based Authentication on Mobile Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015

Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices.
CoRR, 2015

CAIN: Silently Breaking ASLR in the Cloud.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015

Impact of GC design on power and performance for Android.
Proceedings of the 8th ACM International Systems and Storage Conference, 2015

The Correctness-Security Gap in Compiler Optimization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Control-Flow Integrity.
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015

Don't race the memory bus: taming the GC leadfoot.
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015

Fine-Grained Control-Flow Integrity Through Binary Hardening.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Eternal War in Memory.
IEEE Secur. Priv., 2014

Similarity-based matching meets Malware Diversity.
CoRR, 2014

Lockdown: Dynamic Control-Flow Integrity.
CoRR, 2014

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Code-Pointer Integrity.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Lightweight Memory Tracing.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Hot-patching a web server: A case study of ASAP code repair.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

String oriented programming: when ASLR is not enough.
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013

DynSec: On-the-fly Code Rewriting and Repair.
Proceedings of the 5th Workshop on Hot Topics in Software Upgrades, 2013

HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Safe loading and efficient runtime confinement: A foundation for secure execution.
PhD thesis, 2012

Protecting applications against TOCTTOU races by user-space caching of file metadata.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

Safe Loading - A Foundation for Secure Execution of Untrusted Programs.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

LLDSAL: a low-level domain-specific aspect language for dynamic code-generation and program modification.
Proceedings of the seventh workshop on Domain-Specific Aspect Languages, 2012

2011
Fine-grained user-space security through virtualization.
Proceedings of the 7th International Conference on Virtual Execution Environments, 2011

Performance evaluation of adaptivity in software transactional memory.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2011

2010
Generating low-overhead dynamic binary translators.
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010

Usage scenarios for fast dynamic binary translators.
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010

2007
Online optimizations driven by hardware performance monitoring.
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007


  Loading...