REDQUEEN: Fuzzing with Input-to-State Correspondence. C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz NDSS 19, 1-15, 2019 | 360 | 2019 |
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz 26th USENIX security symposium (USENIX Security 17), 167-182, 2017 | 351 | 2017 |
NAUTILUS: Fishing for deep bugs with grammars. C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert NDSS, 2019 | 267 | 2019 |
Analyzing Program Termination and Complexity Automatically with AProVE J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ... Journal of Automated Reasoning 58, 3-31, 2017 | 173 | 2017 |
{ETHBMC}: A bounded model checker for smart contracts J Frank, C Aschermann, T Holz 29th USENIX Security Symposium (USENIX Security 20), 2757-2774, 2020 | 149 | 2020 |
IJON: Exploring Deep State Spaces via Fuzzing C Aschermann, S Schumilo, A Abbasi, T Holz | 142 | 2020 |
{GRIMOIRE}: Synthesizing structure while fuzzing T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ... 28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019 | 120 | 2019 |
Syntia: Synthesizing the semantics of obfuscated code T Blazytko, M Contag, C Aschermann, T Holz 26th USENIX Security Symposium (USENIX Security 17), 643-659, 2017 | 108 | 2017 |
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz 30th USENIX Security Symposium (USENIX Security 21), 2597-2614, 2021 | 93 | 2021 |
Nyx-net: network fuzzing with incremental snapshots S Schumilo, C Aschermann, A Jemmett, A Abbasi, T Holz Proceedings of the Seventeenth European Conference on Computer Systems, 166-180, 2022 | 69 | 2022 |
{AURORA}: Statistical crash analysis for automated root cause explanation T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ... 29th USENIX Security Symposium (USENIX Security 20), 235-252, 2020 | 58 | 2020 |
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz 27th Annual Network and Distributed System Security Symposium, NDSS, 2020 | 48 | 2020 |
{AntiFuzz}: impeding fuzzing audits of binary executables E Güler, C Aschermann, A Abbasi, T Holz 28th USENIX Security Symposium (USENIX Security 19), 1931-1947, 2019 | 41 | 2019 |
Automatically proving termination and memory safety for programs with pointer arithmetic T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ... Journal of Automated Reasoning 58, 33-65, 2017 | 35 | 2017 |
AProVE: Termination and Memory Safety of C Programs: (Competition Contribution) T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl International Conference on Tools and Algorithms for the Construction and …, 2015 | 31 | 2015 |
Purple llama cyberseceval: A secure coding benchmark for language models M Bhatt, S Chennabasappa, C Nikolaidis, S Wan, I Evtimov, D Gabi, ... arXiv preprint arXiv:2312.04724, 2023 | 30 | 2023 |
Loki: Hardening code obfuscation against automated attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... 31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022 | 30 | 2022 |
Lower bounds for runtime complexity of term rewriting F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder Journal of Automated Reasoning 59, 121-163, 2017 | 20 | 2017 |
Technical Report: Hardening Code Obfuscation Against Automated Attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... arXiv preprint arXiv:2106.08913, 2021 | 12 | 2021 |
Inferring lower bounds for runtime complexity F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder 26th International Conference on Rewriting Techniques and Applications (RTA …, 2015 | 12 | 2015 |