Skip to content

Commit

Permalink
Updated publications
Browse files Browse the repository at this point in the history
  • Loading branch information
gannimo committed Mar 5, 2024
1 parent 3e1d635 commit 34d3030
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
Binary file added publications/files/24BAR.pdf
Binary file not shown.
Binary file added publications/files/24SEC.pdf
Binary file not shown.
Binary file added publications/files/24SEC2.pdf
Binary file not shown.
Binary file added publications/files/24SEC3.pdf
Binary file not shown.
12 changes: 6 additions & 6 deletions publications/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -37,12 +37,12 @@
<div class="jumbotron">
<h4>Conference Proceedings</h4>
<p class="publication">
<b><u><a name="24SEC">HyperPill: Fuzzing for Hypervisor-bugs by leveraging the Hardware Virtualization Interface (to appear)</a></u></b><span class="float-right"><b>2024</b></span><br/>Alexander Bulekov, Qiang Liu, Manuel Egele, and Mathias Payer.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i></p><p class="publication">
<b><u><a name="24SEC">EL3XIR: Fuzzing COTS Secure Monitors (to appear)</a></u></b><br/>Christian Lindenmeier, Mathias Payer, and Marcel Busch.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i></p><p class="publication">
<b><u><a name="24SEC">Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android (to appear)</a></u></b><br/>Marcel Busch, Philipp Mao, and Mathias Payer.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i></p><p class="publication">
<b><a href="./files/24SEC3.pdf" name="24SEC3">HyperPill: Fuzzing for Hypervisor-bugs by leveraging the Hardware Virtualization Interface</a></b><span class="float-right"><b>2024</b></span><br/>Alexander Bulekov, Qiang Liu, Manuel Egele, and Mathias Payer.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i> (<a href="https://github.com/HexHive/HyperPill">source</a>)</p><p class="publication">
<b><a href="./files/24SEC2.pdf" name="24SEC2">EL3XIR: Fuzzing COTS Secure Monitors</a></b><br/>Christian Lindenmeier, Mathias Payer, and Marcel Busch.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i> (<a href="https://github.com/HexHive/EL3XIR">source</a>)</p><p class="publication">
<b><a href="./files/24SEC.pdf" name="24SEC">Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android</a></b><br/>Marcel Busch, Philipp Mao, and Mathias Payer.<br/>In <i><b>SEC'24</b>: Usenix Security Symposium, 2024</i></p><p class="publication">
<b><a href="./files/24AsiaCCS.pdf" name="24AsiaCCS">SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer</a></b><br/>Gwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, and Mathias Payer.<br/>In <i><b>AsiaCCS'24</b>: ACM Symp. on InformAtion, Computer and Communications Security, 2024</i> (<a href="https://github.com/HexHive/SyzRisk">source</a>)</p><p class="publication">
<b><a href="./files/24Oakland2.pdf" name="24Oakland2">Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference</a></b><br/>Heqing Huang, Anshunkang Zhou, Mathias Payer, and Charles Zhang.<br/>In <i><b>Oakland'24</b>: IEEE International Symposium on Security and Privacy, 2024</i></p><p class="publication">
<b><a href="./files/24Oakland.pdf" name="24Oakland">SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices</a></b><br/>Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah.<br/>In <i><b>Oakland'24</b>: IEEE International Symposium on Security and Privacy, 2024</i></p><p class="publication">
<b><a href="./files/24Oakland2.pdf" name="24Oakland2">Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference</a></b><br/>Heqing Huang, Anshunkang Zhou, Mathias Payer, and Charles Zhang.<br/>In <i><b>Oakland'24</b>: IEEE International Symposium on Security and Privacy, 2024</i> (<a href="http://dx.doi.org/10.1109/SP54263.2024.00142">DOI</a>)</p><p class="publication">
<b><a href="./files/24Oakland.pdf" name="24Oakland">SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices</a></b><br/>Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah.<br/>In <i><b>Oakland'24</b>: IEEE International Symposium on Security and Privacy, 2024</i> (<a href="http://dx.doi.org/10.1109/SP54263.2024.00070">DOI</a>)</p><p class="publication">
<b><a href="./files/23FSE.pdf" name="23FSE">Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities</a></b><span class="float-right"><b>2023</b></span><br/>Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, Francois Gauthier, Antonio Bianchi, and Mathias Payer.<br/>In <i><b>FSE'23</b>: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023</i> (<a href="https://github.com/HexHive/Crystallizer">source</a>, <a href="http://dx.doi.org/10.1145/3611643.3616313">DOI</a>)</p><p class="publication">
<b><a href="./files/23SEC6.pdf" name="23SEC6">ACTOR: Action-Guided Kernel Fuzzing</a></b><br/>Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, and Giovanni Vigna.<br/>In <i><b>SEC'23</b>: Usenix Security Symposium, 2023</i></p><p class="publication">
<b><a href="./files/23SEC5.pdf" name="23SEC5">FishFuzz: Catch Deeper Bugs by Throwing Larger Nets</a></b><br/>Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, and Mathias Payer.<br/>In <i><b>SEC'23</b>: Usenix Security Symposium, 2023</i> (<a href="https://github.com/HexHive/FishFuzz">source</a>, <a href="https://zenodo.org/record/6405418">artifact</a>)</p><p class="publication">
Expand Down Expand Up @@ -150,7 +150,7 @@ <h4>Conference Proceedings</h4>
<b><a href="./files/14SP.pdf" name="14SP">Eternal War in Memory</a></b><br/>Laszlo Szekeres, Mathias Payer, Tao Wei, and R. Sekar.<br/>In <i><b>SP'14</b>: IEEE Security and Privacy Magazine, 2014</i> (<a href="http://dx.doi.org/10.1109/MSP.2013.47">DOI</a>)</p><h4>Workshop Proceedings</h4>
<p class="publication">
<b><a href="./files/24SBFT.pdf" name="24SBFT">TuneFuzz: adaptively exploring target programs</a></b><span class="float-right"><b>2024</b></span><br/>Han Zheng, Flavio Toffalini, and Mathias Payer.<br/>In <i><b>SBFT'24</b>: Workshop on Search-Based and Fuzz Testing, 2024</i> (<a href="https://github.com/HexHive/FishFuzz">source</a>)</p><p class="publication">
<b><u><a name="24BAR">SURGEON: Performant, Flexible and Accurate Re-Hosting via Transplantation (to appear)</a></u></b><br/>Florian Hofhammer, Marcel Busch, Qinying Wang, Manuel Egele, and Mathias Payer.<br/>In <i><b>BAR'24</b>: Workshop on Binary Analysis Research, 2024</i> (<b>distinguished paper award</b>, <a href="https://github.com/HexHive/IOVFI">source</a>)</p><p class="publication">
<b><a href="./files/24BAR.pdf" name="24BAR">SURGEON: Performant, Flexible and Accurate Re-Hosting via Transplantation</a></b><br/>Florian Hofhammer, Marcel Busch, Qinying Wang, Manuel Egele, and Mathias Payer.<br/>In <i><b>BAR'24</b>: Workshop on Binary Analysis Research, 2024</i> (<b>distinguished paper award</b>, <a href="https://github.com/HexHive/SURGEON">source</a>, <a href="http://dx.doi.org/10.14722/bar.2024.23011">DOI</a>)</p><p class="publication">
<b><a href="./files/23HotOS.pdf" name="23HotOS">Creating Trust by Abolishing Hierarchies</a></b><span class="float-right"><b>2023</b></span><br/>Charly Castes, Adrien Ghosn, Neelu S. Kalani, Yuchen Qian, Marios Kogias, Mathias Payer, and Edouard Bugnion.<br/>In <i><b>HotOS'23</b>: Workshop on Hot Topics in Operating Systems, 2023</i></p><p class="publication">
<b><a href="./files/23BAR.pdf" name="23BAR">Accurate Compiler and Optimization Independent Function Identification Using Program State Transformations</a></b><br/>Derrick McKee, Nathan Burow, and Mathias Payer.<br/>In <i><b>BAR'23</b>: Workshop on Binary Analysis Research, 2023</i> (<a href="./files/23BAR-presentation.pdf">presentation</a>, <a href="https://github.com/HexHive/IOVFI">source</a>, <a href="http://dx.doi.org/10.14722/bar.2023.23003">DOI</a>)</p><p class="publication">
<b><a href="./files/22AUTOSEC.pdf" name="22AUTOSEC">Attacks on CAN Error Handling Mechanism (Demo)</a></b><span class="float-right"><b>2022</b></span><br/>Khaled Serag, Vireshwar Kumar, Z. Berkay Celik, Rohit Bhatia, Mathias Payer, and Dongyan Xu.<br/>In <i><b>AUTOSEC'22</b>: Automotive and Autonomous Vehicle Security Workshop, 2022</i> (<a href="https://www.youtube.com/watch?v=aiNmhODx04U">attack video</a>, <a href="https://www.youtube.com/watch?v=CDHY1ZUwntU">defense video</a>, <a href="http://dx.doi.org/https://dx.doi.org/10.14722/autosec.2022.23013">DOI</a>)</p><p class="publication">
Expand Down

0 comments on commit 34d3030

Please sign in to comment.