Mathias Payer
Orcid: 0000-0001-5054-7547Affiliations:
- EPFL, Lausanne, Switzerland
According to our database1,
Mathias Payer
authored at least 143 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Proc. ACM Program. Lang., 2024
IEEE Secur. Priv., 2024
Could ChatGPT get an Engineering Degree? Evaluating Higher Education Vulnerability to AI Assistants.
CoRR, 2024
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones.
Proceedings of the 33rd USENIX Security Symposium, 2024
HYPERPILL: Fuzzing for Hypervisor-bugs by leveraging the Hardware Virtualization Interface.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 USENIX Annual Technical Conference, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 17th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
ACM Trans. Softw. Eng. Methodol., September, 2023
Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs.
J. Hardw. Syst. Secur., September, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Dataset, May, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021
Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
IEEE Secur. Priv., 2019
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems.
Proceedings of the IEEE Real-Time Systems Symposium, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
ACM Comput. Surv., 2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 26th International Conference on Compiler Construction, 2017
2016
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015
CoRR, 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 8th ACM International Systems and Storage Conference, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013
Proceedings of the 5th Workshop on Hot Topics in Software Upgrades, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
PhD thesis, 2012
Protecting applications against TOCTTOU races by user-space caching of file metadata.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
LLDSAL: a low-level domain-specific aspect language for dynamic code-generation and program modification.
Proceedings of the seventh workshop on Domain-Specific Aspect Languages, 2012
2011
Proceedings of the 7th International Conference on Virtual Execution Environments, 2011
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2011
2010
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010
Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, 2010
2007
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007