Dowsing for overflows: a guided fuzzer to find buffer boundary violations

Matthias Neugschwandtner , Asia Slowinska , Istvan Haller , Herbert Bos
usenix security symposium 49 -64

135
2013
A View to a Kill: WebView Exploitation

Matthias Neugschwandtner , Christian Platzer , Martina Lindorfer
6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13)

32
2013
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities.

Matthias Neugschwandtner , Asia Slowinska , Istvan Haller , Herbert Bos
;login:: the magazine of USENIX & SAGE 38 ( 6) 16 -19

12
2013
From random block corruption to privilege escalation: a filesystem attack vector for rowhammer-like attacks

Matthias Neugschwandtner , Anil Kurmus , Thomas Parnell , Nikolaos Papandreou
WOOT'17 Proceedings of the 11th USENIX Conference on Offensive Technologies 4 -4

15
2017
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices

Matthias Neugschwandtner , Collin Mulliner , William Robertson , Engin Kirda
Trust and Trustworthy Computing 60 -81

1
2016
AndRadar: Fast Discovery of Android Applications in Alternative Markets

Martina Lindorfer , Stamatis Volanis , Alessandro Sisto , Matthias Neugschwandtner
international conference on detection of intrusions and malware, and vulnerability assessment 51 -71

49
2014
dAnubis: dynamic device driver analysis based on virtual machine introspection

Matthias Neugschwandtner , Christian Platzer , Paolo Milani Comparetti , Ulrich Bayer
international conference on detection of intrusions and malware and vulnerability assessment 41 -60

18
2010
Memory Categorization: Separating Attacker-Controlled Data

Matthias Neugschwandtner , Alessandro Sorniotti , Anil Kurmus
international conference on detection of intrusions and malware, and vulnerability assessment 263 -287

2019
Reconciling Security and Functional Requirements in Multi-tenant Clouds

Ghassan Karame , Matthias Neugschwandtner , Melek Önen , Hubert Ritzdorf
international workshop on security 11 -18

1
2017
MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis

Martina Lindorfer , Matthias Neugschwandtner , Christian Platzer ,
computer software and applications conference 2 422 -433

125
2015
Take a bite - Finding the worm in the Apple

Martina Lindorfer , Bernhard Miller , Matthias Neugschwandtner , Christian Platzer
international conference on information and communication security 1 -5

3
2013
FORECAST: skimming off the malware cream

Matthias Neugschwandtner , Paolo Milani Comparetti , Gregoire Jacob , Christopher Kruegel
annual computer security applications conference 11 -20

26
2011
Detecting malware's failover C&C strategies with squeeze

Matthias Neugschwandtner , Paolo Milani Comparetti , Christian Platzer
annual computer security applications conference 21 -30

24
2011
Lobotomy: An Architecture for JIT Spraying Mitigation

Martin Jauernig , Matthias Neugschwandtner , Christian Platzer , Paolo Milani Comparetti
availability, reliability and security 50 -58

4
2014
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors

Martina Lindorfer , Matthias Neugschwandtner , Lukas Weichselbaum , Yanick Fratantonio
2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) 3 -17

380
2014
Speculator: a tool to analyze speculative execution attacks and mitigations

Andrea Mambretti , Matthias Neugschwandtner , Alessandro Sorniotti , Engin Kirda
annual computer security applications conference 747 -761

9
2019
Endorsement in Hyperledger Fabric

Elli Androulaki , Angelo De Caro , Matthias Neugschwandtner , Alessandro Sorniotti
2019 IEEE International Conference on Blockchain (Blockchain) 510 -519

6
2019
SMoTherSpectre: Exploiting Speculative Execution through Port Contention

Atri Bhattacharyya , Alexandra Sandulescu , Matthias Neugschwandtner , Alessandro Sorniotti
computer and communications security 785 -800

158
2019
A transparent defense against USB eavesdropping attacks

Matthias Neugschwandtner , Anton Beitler , Anil Kurmus
european workshop on system security 6

12
2016
The BORG: Nanoprobing Binaries for Buffer Overreads

Matthias Neugschwandtner , Paolo Milani Comparetti , Istvan Haller , Herbert Bos
conference on data and application security and privacy 87 -97

39
2015