Cornelius Aschermann
Cornelius Aschermann
Ruhr University Bochum
Verified email at hexgolems.com - Homepage
Title
Cited by
Cited by
Year
kafl: Hardware-assisted feedback fuzzing for {OS} kernels
S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 167-182, 2017
1412017
Analyzing Program Termination and Complexity Automatically with AProVE
J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ...
Journal of Automated Reasoning 58 (1), 3-31, 2017
1092017
REDQUEEN: Fuzzing with Input-to-State Correspondence.
C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz
NDSS 19, 1-15, 2019
952019
NAUTILUS: Fishing for Deep Bugs with Grammars.
C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert
NDSS, 2019
592019
Syntia: Synthesizing the semantics of obfuscated code
T Blazytko, M Contag, C Aschermann, T Holz
26th {USENIX} Security Symposium ({USENIX} Security 17), 643-659, 2017
482017
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1985-2002, 2019
312019
AProVE: Termination and Memory Safety of C Programs
T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl
International Conference on Tools and Algorithms for the Construction and …, 2015
272015
Automatically proving termination and memory safety for programs with pointer arithmetic
T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ...
Journal of Automated Reasoning 58 (1), 33-65, 2017
252017
IJON: Exploring Deep State Spaces via Fuzzing
C Aschermann, S Schumilo, A Abbasi, T Holz
212020
{ETHBMC}: A Bounded Model Checker for Smart Contracts
J Frank, C Aschermann, T Holz
29th {USENIX} Security Symposium ({USENIX} Security 20), 2757-2774, 2020
172020
Antifuzz: Impeding fuzzing audits of binary executables
E Güler, C Aschermann, A Abbasi, T Holz
28th {USENIX} Security Symposium ({USENIX} Security 19), 1931-1947, 2019
122019
Lower bounds for runtime complexity of term rewriting
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
Journal of Automated Reasoning 59 (1), 121-163, 2017
122017
Inferring lower bounds for runtime complexity
F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder
26th International Conference on Rewriting Techniques and Applications (RTA …, 2015
102015
{AURORA}: Statistical Crash Analysis for Automated Root Cause Explanation
T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 235-252, 2020
82020
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
27th Annual Network and Distributed System Security Symposium, NDSS, 2020
42020
Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types
S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
22021
Loki: Hardening Code Obfuscation Against Automated Attacks
M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ...
arXiv preprint arXiv:2106.08913, 2021
2021
Algorithmic improvements for feedback-driven fuzzing.
C Aschermann
Ruhr University Bochum, Germany, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18