Moritz Schloegel

Orcid: 0000-0003-1630-1687

Affiliations:
  • Ruhr University Bochum, Germany


According to our database1, Moritz Schloegel authored at least 13 papers between 2017 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Instructions Unclear: Undefined Behaviour in Cellular Network Specifications.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Proceedings of the 32nd USENIX Security Symposium, 2023

Space Odyssey: An Experimental Software Security Analysis of Satellites.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Drone Security and the Mysterious Case of DJI's DroneID.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage (Registered Report).
Proceedings of the 2nd International Fuzzing Workshop, 2023

2022
Loki: Hardening Code Obfuscation Against Automated Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

JIT-Picking: Differential Fuzzing of JavaScript Engines.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
GRIMOIRE: Synthesizing Structure while Fuzzing.
Proceedings of the 28th USENIX Security Symposium, 2019

2017
A look at the dark side of hardware reverse engineering - a case study.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017


  Loading...