Follow
Mathias Payer
Mathias Payer
EPFL IC, HexHive Laboratory
Verified email at nebelwelt.net - Homepage
Title
Cited by
Cited by
Year
{Control-Flow} bending: On the effectiveness of {Control-Flow} integrity
N Carlini, A Barresi, M Payer, D Wagner, TR Gross
24th USENIX Security Symposium (USENIX Security 15), 161-176, 2015
1283*2015
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10382014
SoK: Eternal War in Memory
L Szekeres, M Payer, T Wei, D Song
Security and Privacy (SP), 2013 IEEE Symposium on, 48-62, 2013
9882013
Code-pointer integrity
K Volodymyr, S Laszlo, P Mathias, C George, R Sekar
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014
648*2014
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
3642017
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili, M Payer
2018 IEEE Symposium on Security and Privacy (SP), 697-710, 2018
3632018
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3552020
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2282019
Fine-Grained Control-Flow Integrity through Binary Hardening
M Payer, A Barresi, TR Gross
DIMVA '15: Conference on Detection of Intrusions and Malware & Vulnerability …, 2015
1842015
HexPADS: a platform to detect “stealth” attacks
M Payer
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
1772016
SoK: Shining light on shadow stacks
N Burow, X Zhang, M Payer
2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019
1712019
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
S Dinesh, N Burow, D Xu, M Payer
2020 IEEE Symposium on Security and Privacy (SP), 1497-1511, 2020
1652020
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1532018
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016
1502016
Magma: A ground-truth fuzzing benchmark
A Hazimeh, A Herrera, M Payer
Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on …, 2021
1492021
{HALucinator}: Firmware re-hosting through abstraction layer emulation
AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020
1482020
Protecting bare-metal embedded systems with privilege overlays
AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ...
2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017
1292017
The Correctness-Security Gap in Compiler Optimization
V D’Silva, M Payer, D Song
Second Language-theoretic Security (LangSec) IEEE S&P Workshop, 2015
1292015
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1112016
{FuzzGen}: Automatic fuzzer generation
K Ispoglou, D Austin, V Mohan, M Payer
29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020
1102020
The system can't perform the operation now. Try again later.
Articles 1–20