default search action
28th USENIX Security Symposium 2019: Santa Clara, CA, USA
- Nadia Heninger, Patrick Traynor:
28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019. USENIX Association 2019
Wireless Security
- Pallavi Sivakumaran, Jorge Blasco:
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape. 1-18 - Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 19-36 - Milan Stute, Sashank Narain, Alex Mariotto, Alexander Heinrich, David Kreitschmann, Guevara Noubir, Matthias Hollick:
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link. 37-54 - Hojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Song Min Kim, Yongdae Kim:
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE. 55-72 - Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. 73-88
Protecting Users Everywhere
- Christine Chen, Nicola Dell, Franziska Roesner:
Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors. 89-104 - Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, Thomas Ristenpart:
Clinical Computer Security for Victims of Intimate Partner Violence. 105-122 - Noah J. Apthorpe, Sarah Varghese, Nick Feamster:
Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA. 123-140 - Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. 141-158 - Eric Zeng, Franziska Roesner:
Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. 159-176
Hardware Security
- Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. 177-194 - Mustakimur Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang:
Origin-sensitive Control Flow Integrity. 195-211 - Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HardFails: Insights into Software-Exploitable Hardware Bugs. 213-230 - Donghyun Kwon, Jangseop Shin, Giyeol Kim, Byoungyoung Lee, Yeongpil Cho, Yunheung Paek:
uXOM: Efficient eXecute-Only Memory on ARM Cortex-M. 231-247 - Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. 249-266
Machine Learning Applications
- Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song:
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. 267-284 - Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. 285-302 - Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard E. Harang:
ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. 303-320 - Ambra Demontis, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, Fabio Roli:
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks. 321-338 - Felix Fischer, Huang Xiao, Ching-yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags:
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography. 339-356
Planes, Cars, and Robots
- Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir:
Wireless Attacks on Aircraft Instrument Landing Systems. 357-372 - Nishant Bhaskar, Maxwell Bland, Kirill Levchenko, Aaron Schulman:
Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers. 373-388 - Sekar Kulandaivel, Tushar Goyal, Arnav Kumar Agrawal, Vyas Sekar:
CANvas: Fast and Inexpensive Automotive Network Mapping. 389-405 - Richard Baker, Ivan Martinovic:
Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. 407-424 - Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. 425-442
Machine Learning, Adversarial and Otherwise
- Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. 443-460 - Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici:
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. 461-478 - Erwin Quiring, Alwin Maier, Konrad Rieck:
Misleading Authorship Attribution of Source Code using Adversarial Learning. 479-496 - Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras:
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. 497-514 - Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. 515-532
Mobile Security 1
- Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel:
simTPM: User-centric TPM for Mobile Devices. 533-550 - Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio:
The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. 551-566 - Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. 567-584 - Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie:
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. 585-602 - Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman:
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. 603-620
Side Channels
- Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. 621-637 - Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. 639-656 - Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. 657-674 - Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard:
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. 675-692 - Shin-Yeh Tsai, Mathias Payer, Yiying Zhang:
Pythia: Remote Oracles for the Masses. 693-710
Mobile Security 2
- Anh Pham, Italo Dacosta, Eleonora Losiouk, John Stephan, Kévin Huguenin, Jean-Pierre Hubaux:
HideMyApp: Hiding the Presence of Sensitive Apps on Android. 711-728 - Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. 729-746 - Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. 747-764 - Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. 765-781
Crypto Means Cryptocurrencies
- Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. 783-800 - Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. 801-818 - Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. 819-836 - Haaroon Yousaf, George Kappos, Sarah Meiklejohn:
Tracing Transactions Across Cryptocurrency Ledgers. 837-850
Intelligence and Vulnerabilities
- Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. 851-867 - Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. 869-885 - Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. 887-903 - Yun Shen, Gianluca Stringhini:
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. 905-921
Web Attacks
- Cristian-Alexandru Staicu, Michael Pradel:
Leaky Images: Targeted Privacy Attacks in the Web. 923-939 - Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. 941-957 - John V. Monaco:
What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete. 959-976 - Guangliang Yang, Jeff Huang, Guofei Gu:
Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities. 977-994 - Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, Michael Pradel:
Small World with High Risks: A Study of Security Threats in the npm Ecosystem. 995-1010
Crypto Means Cryptographic Attacks
- Jens Müller, Marcus Brinkmann, Damian Poddebniak, Hanno Böck, Sebastian Schinzel, Juraj Somorovsky, Jörg Schwenk:
"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails. 1011-1028 - Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt:
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities. 1029-1046 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. 1047-1061 - Amit Klein, Benny Pinkas:
From IP ID to Device ID and KASLR Bypass. 1063-1080 - Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye:
When the Signal is in the Noise: Exploiting Diffix's Sticky Noise. 1081-1098
IoT Security
- Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. 1099-1114 - Bing Huang, Alvaro A. Cárdenas, Ross Baldick:
Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks. 1115-1132 - Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, Yuqing Zhang:
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. 1133-1150 - Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. 1151-1167 - Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, Zakir Durumeric:
All Things Considered: An Analysis of IoT Devices on Home Networks. 1169-1185
OS Security
- Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou:
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. 1187-1204 - Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang:
PeX: A Permission Check Analysis Framework for Linux Kernel. 1205-1220 - Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, Deepak Garg:
ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). 1221-1238 - Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. 1239-1256 - Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. 1257-1272
Phishing and Scams
- Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David A. Wagner:
Detecting and Characterizing Lateral Phishing at Scale. 1273-1290 - Asaf Cidon, Lior Gavish, Itay Bleier, Nadia Korshun, Marco Schweighauser, Alexey Tsitkin:
High Precision Detection of Business Email Compromise. 1291-1307 - Amber van der Heijden, Luca Allodi:
Cognitive Triaging of Phishing Attacks. 1309-1326 - Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. 1327-1340 - Arman Noroozian, Jan Koenders, Eelco van Veldhuizen, Carlos Hernandez Gañán, Sumayah A. Alrwais, Damon McCoy, Michel van Eeten:
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting. 1341-1356
Distributed System Security + Verifying Hardware
- Shih-Wei Li, John S. Koh, Jason Nieh:
Protecting Cloud Virtual Machines from Hypervisor and Host Operating System Exploits. 1357-1374 - Michael P. Andersen, Sam Kumar, Moustafa AbdelBaky, Gabe Fierro, John Kolb, Hyung-Sin Kim, David E. Culler, Raluca Ada Popa:
WAVE: A Decentralized Authorization Framework with Transitive Delegation. 1375-1392 - Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos:
in-toto: Providing farm-to-table guarantees for bits and bytes. 1393-1410 - Klaus von Gleissenthall, Rami Gökhan Kici, Deian Stefan, Ranjit Jhala:
IODINE: Verifying Constant-Time Execution of Hardware. 1411-1428 - Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:
VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. 1429-1446
Crypto Means Cryptography
- Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert:
Mobile Private Contact Discovery at Scale. 1447-1464 - Tahina Ramananandro, Antoine Delignat-Lavaud, Cédric Fournet, Nikhil Swamy, Tej Chajed, Nadim Kobeissi, Jonathan Protzenko:
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats. 1465-1482 - R. Joseph Connor, Max Schuchard:
Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips. 1483-1500 - M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. 1501-1518 - Sam Kumar, Yuncong Hu, Michael P. Andersen, Raluca Ada Popa, David E. Culler:
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. 1519-1536
Passwords
- Ding Wang, Ping Wang, Debiao He, Yuan Tian:
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. 1537-1555 - Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. 1556-1571 - Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:
Probability Model Transforming Encoders Against Encoding Attacks. 1573-1590
Cryptocurrency Scams
- Christof Ferreira Torres, Mathis Steichen, Radu State:
The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts. 1591-1607 - Jiahua Xu, Benjamin Livshits:
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme. 1609-1625 - Hugo L. J. Bijmans, Tim M. Booij, Christian Doerr:
Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of Cryptojacking Campaigns at Internet Scale. 1627-1644
Web Defenses
- Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang:
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting. 1645-1660 - Charles Reis, Alexander Moshchuk, Nasko Oskov:
Site Isolation: Process Separation for Web Sites within the Browser. 1661-1678 - Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, Adam Doupé:
Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting. 1679-1696 - Babak Amin Azad, Pierre Laperdrix, Nick Nikiforakis:
Less is More: Quantifying the Security Benefits of Debloating Web Applications. 1697-1714 - Christopher Thompson, Martin Shelton, Emily Stark, Max Walker, Emily Schechter, Adrienne Porter Felt:
The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators. 1715-1732
Software Security
- Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, Wenke Lee:
RAZOR: A Framework for Post-deployment Software Debloating. 1733-1750 - Fabio Pagani, Davide Balzarotti:
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques. 1751-1768 - Kangjie Lu, Aditya Pakki, Qiushi Wu:
Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences. 1769-1786 - Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song:
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 1787-1804 - Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. 1805-1821
Privacy
- Rob Jansen, Tavish Vaidya, Micah Sherr:
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. 1823-1840 - Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. 1841-1858 - Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso:
On (The Lack Of) Location Privacy in Crowdsourcing Applications. 1859-1876 - Takao Murakami, Yusuke Kawamoto:
Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation. 1877-1894 - Bargav Jayaraman, David Evans:
Evaluating Differentially Private Machine Learning in Practice. 1895-1912
Fuzzing
- Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu Hyung Lee, Taesoo Kim:
Fuzzification: Anti-Fuzzing Techniques. 1913-1930 - Emre Güler, Cornelius Aschermann, Ali Abbasi, Thorsten Holz:
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. 1931-1947 - Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah:
MOPT: Optimized Mutation Scheduling for Fuzzers. 1949-1966 - Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su:
EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. 1967-1983 - Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz:
GRIMOIRE: Synthesizing Structure while Fuzzing. 1985-2002
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.