Cornelius Aschermann
Cornelius Aschermann
Ruhr University Bochum
E-mail confirmado em hexgolems.com
TítuloCitado porAno
Analyzing Program Termination and Complexity Automatically with AProVE
J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ...
Journal of Automated Reasoning 58 (1), 3-31, 2017
702017
kafl: Hardware-assisted feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 167-182, 2017
642017
AProVE: Termination and Memory Safety of C Programs
T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl
International Conference on Tools and Algorithms for the Construction and …, 2015
242015
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
202019
Automatically proving termination and memory safety for programs with pointer arithmetic
T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ...
Journal of Automated Reasoning 58 (1), 33-65, 2017
172017
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 643-659, 2017
152017
NAUTILUS: Fishing for Deep Bugs with Grammars.
C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert
NDSS, 2019
132019
Lower bounds for runtime complexity of term rewriting
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
Journal of Automated Reasoning 59 (1), 121-163, 2017
122017
Inferring lower bounds for runtime complexity
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
26th International Conference on Rewriting Techniques and Applications (RTA …, 2015
92015
{GRIMOIRE}: Synthesizing Structure while Fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1985-2002, 2019
72019
ANTIFUZZ: impeding fuzzing audits of binary executables
E Güler, C Aschermann, A Abbasi, T Holz
28th {USENIX} Security Symposium ({USENIX} Security 19), 1931-1947, 2019
22019
Syntia: Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
T Blazytko, M Contag, C Aschermann, T Holz
1
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–12