{Control-Flow} bending: On the effectiveness of {Control-Flow} integrity N Carlini, A Barresi, M Payer, D Wagner, TR Gross 24th USENIX Security Symposium (USENIX Security 15), 161-176, 2015 | 1318* | 2015 |
The matter of heartbleed Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ... Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014 | 1061 | 2014 |
SoK: Eternal War in Memory L Szekeres, M Payer, T Wei, D Song Security and Privacy (SP), 2013 IEEE Symposium on, 48-62, 2013 | 1019 | 2013 |
Code-pointer integrity K Volodymyr, S Laszlo, P Mathias, C George, R Sekar 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014 | 662* | 2014 |
Control-flow integrity: Precision, security, and performance N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017 | 379 | 2017 |
T-Fuzz: fuzzing by program transformation H Peng, Y Shoshitaishvili, M Payer 2018 IEEE Symposium on Security and Privacy (SP), 697-710, 2018 | 372 | 2018 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 357 | 2020 |
Smotherspectre: exploiting speculative execution through port contention A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 245 | 2019 |
Fine-Grained Control-Flow Integrity through Binary Hardening M Payer, A Barresi, TR Gross DIMVA '15: Conference on Detection of Intrusions and Malware & Vulnerability …, 2015 | 189 | 2015 |
HexPADS: a platform to detect “stealth” attacks M Payer Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016 | 185 | 2016 |
SoK: Shining light on shadow stacks N Burow, X Zhang, M Payer 2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019 | 180 | 2019 |
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization S Dinesh, N Burow, D Xu, M Payer 2020 IEEE Symposium on Security and Privacy (SP), 1497-1511, 2020 | 173 | 2020 |
{HALucinator}: Firmware re-hosting through abstraction layer emulation AA Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ... 29th USENIX Security Symposium (USENIX Security 20), 1201-1218, 2020 | 160 | 2020 |
Magma: A ground-truth fuzzing benchmark A Hazimeh, A Herrera, M Payer Abstract Proceedings of the 2021 ACM SIGMETRICS/International Conference on …, 2021 | 159 | 2021 |
Block oriented programming: Automating data-only attacks KK Ispoglou, B AlBassam, T Jaeger, M Payer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 158 | 2018 |
Fine-grained control-flow integrity for kernel software X Ge, N Talele, M Payer, T Jaeger 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016 | 158 | 2016 |
The Correctness-Security Gap in Compiler Optimization V D’Silva, M Payer, D Song Second Language-theoretic Security (LangSec) IEEE S&P Workshop, 2015 | 135 | 2015 |
Protecting bare-metal embedded systems with privilege overlays AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ... 2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017 | 132 | 2017 |
{FuzzGen}: Automatic fuzzer generation K Ispoglou, D Austin, V Mohan, M Payer 29th USENIX Security Symposium (USENIX Security 20), 2271-2287, 2020 | 116 | 2020 |
TypeSan: Practical type confusion detection I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 113 | 2016 |