关注
Cornelius Aschermann
Cornelius Aschermann
Ruhr University Bochum
在 hexgolems.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
3602019
{kAFL}:{Hardware-Assisted} feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th USENIX security symposium (USENIX Security 17), 167-182, 2017
3512017
NAUTILUS: Fishing for deep bugs with grammars.
C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert
NDSS, 2019
2672019
Analyzing Program Termination and Complexity Automatically with AProVE
J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ...
Journal of Automated Reasoning 58, 3-31, 2017
1732017
{ETHBMC}: A bounded model checker for smart contracts
J Frank, C Aschermann, T Holz
29th USENIX Security Symposium (USENIX Security 20), 2757-2774, 2020
1492020
IJON: Exploring Deep State Spaces via Fuzzing
C Aschermann, S Schumilo, A Abbasi, T Holz
1422020
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1202019
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th USENIX Security Symposium (USENIX Security 17), 643-659, 2017
1082017
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
30th USENIX Security Symposium (USENIX Security 21), 2597-2614, 2021
932021
Nyx-net: network fuzzing with incremental snapshots
S Schumilo, C Aschermann, A Jemmett, A Abbasi, T Holz
Proceedings of the Seventeenth European Conference on Computer Systems, 166-180, 2022
692022
{AURORA}: Statistical crash analysis for automated root cause explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th USENIX Security Symposium (USENIX Security 20), 235-252, 2020
582020
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
27th Annual Network and Distributed System Security Symposium, NDSS, 2020
482020
{AntiFuzz}: impeding fuzzing audits of binary executables
E Güler, C Aschermann, A Abbasi, T Holz
28th USENIX Security Symposium (USENIX Security 19), 1931-1947, 2019
412019
Automatically proving termination and memory safety for programs with pointer arithmetic
T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ...
Journal of Automated Reasoning 58, 33-65, 2017
352017
AProVE: Termination and Memory Safety of C Programs: (Competition Contribution)
T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl
International Conference on Tools and Algorithms for the Construction and …, 2015
312015
Purple llama cyberseceval: A secure coding benchmark for language models
M Bhatt, S Chennabasappa, C Nikolaidis, S Wan, I Evtimov, D Gabi, ...
arXiv preprint arXiv:2312.04724, 2023
302023
Loki: Hardening code obfuscation against automated attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022
302022
Lower bounds for runtime complexity of term rewriting
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
Journal of Automated Reasoning 59, 121-163, 2017
202017
Technical Report: Hardening Code Obfuscation Against Automated Attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
arXiv preprint arXiv:2106.08913, 2021
122021
Inferring lower bounds for runtime complexity
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
26th International Conference on Rewriting Techniques and Applications (RTA …, 2015
122015
系统目前无法执行此操作,请稍后再试。
文章 1–20