Matthias Neugschwandtner

According to our database1, Matthias Neugschwandtner authored at least 23 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Binsweep: Reliably Restricting Untrusted Instruction Streams with Static Binary Analysis and Control-Flow Integrity.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

2022
Look Ma, no constants: practical constant blinding in GraalVM.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

2019
Two methods for exploiting speculative control flow hijacks.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Memory Categorization: Separating Attacker-Controlled Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Endorsement in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2019

Speculator: a tool to analyze speculative execution attacks and mitigations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Reconciling Security and Functional Requirements in Multi-tenant Clouds.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

A transparent defense against USB eavesdropping attacks.
Proceedings of the 9th European Workshop on System Security, 2016

2015
MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

The BORG: Nanoprobing Binaries for Buffer Overreads.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
AndRadar: Fast Discovery of Android Applications in Alternative Markets.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

Lobotomy: An Architecture for JIT Spraying Mitigation.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities.
login Usenix Mag., 2013

Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

A View to a Kill: WebView Exploitation.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Take a bite - Finding the worm in the Apple.
Proceedings of the 9th International Conference on Information, 2013

2012
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Detecting malware's failover C&C strategies with squeeze.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

FORECAST: skimming off the malware cream.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
<i>d</i>Anubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection.
Proceedings of the Detection of Intrusions and Malware, 2010


  Loading...