Items where Author is "Pewny, Jannik"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 3.

Conference or Workshop Item

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: S&P - IEEE Symposium on Security and Privacy

Backes, Michael and Holz, Thorsten and Kollenda, Benjamin and Koppe, Philipp and N├╝rnberger, Stefan and Pewny, Jannik
(2014) You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
In: Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14).
Conference: CCS - ACM Conference on Computer and Communications Security

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC - Annual Computer Security Applications Conference

This list was generated on Fri Apr 26 00:03:14 2019 CEST.