Robert Gawlik

According to our database1, Robert Gawlik authored at least 17 papers between 2014 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
REDQUEEN: Fuzzing with Input-to-State Correspondence.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Static Detection of Uninitialized Stack Variables in Binary Code.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
SoK: Make JIT-Spray Great Again.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

On the Weaknesses of Function Table Randomization.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Towards Automated Generation of Exploitation Primitives for Web Browsers.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Cross-architecture bug search in binary executables.
it Inf. Technol., 2017

kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels.
Proceedings of the 26th USENIX Security Symposium, 2017

Reverse Engineering x86 Processor Microcode.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
On the impact of memory corruption vulnerabilities in client applications.
PhD thesis, 2016

Undermining Information Hiding (and What to Do about It).
Proceedings of the 25th USENIX Security Symposium, 2016

Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets.
Proceedings of the Computer Security - ESORICS 2016, 2016

Detile: Fine-Grained Information Leak Detection in Script Engines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2014
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Automated generation of models for fast and precise detection of HTTP-based malware.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Towards automated integrity protection of C++ virtual function tables in binary programs.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...