Tim Blazytko

According to our database1, Tim Blazytko authored at least 12 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Loki: Hardening Code Obfuscation Against Automated Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

JIT-Picking: Differential Fuzzing of JavaScript Engines.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Reasoning about software security via synthesized behavioral substitutes.
PhD thesis, 2020

AURORA: Statistical Crash Analysis for Automated Root Cause Explanation.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
GRIMOIRE: Synthesizing Structure while Fuzzing.
Proceedings of the 28th USENIX Security Symposium, 2019

REDQUEEN: Fuzzing with Input-to-State Correspondence.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Towards Automated Generation of Exploitation Primitives for Web Browsers.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Syntia: Synthesizing the Semantics of Obfuscated Code.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017


  Loading...