kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. S Schumilo, C Aschermann, R Gawlik, S Schinzel, T Holz USENIX Security Symposium, 167-182, 2017 | 246 | 2017 |
REDQUEEN: Fuzzing with Input-to-State Correspondence. C Aschermann, S Schumilo, T Blazytko, R Gawlik, T Holz NDSS 19, 1-15, 2019 | 232 | 2019 |
NAUTILUS: Fishing for Deep Bugs with Grammars. C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert NDSS, 2019 | 152 | 2019 |
Analyzing Program Termination and Complexity Automatically with AProVE J Giesl, C Aschermann, M Brockschmidt, F Emmes, F Frohn, C Fuhs, ... Journal of Automated Reasoning 58, 3-31, 2017 | 145 | 2017 |
IJON: Exploring Deep State Spaces via Fuzzing C Aschermann, S Schumilo, A Abbasi, T Holz | 84 | 2020 |
Syntia: Synthesizing the Semantics of Obfuscated Code. T Blazytko, M Contag, C Aschermann, T Holz USENIX Security Symposium, 643-659, 2017 | 84 | 2017 |
GRIMOIRE: Synthesizing Structure while Fuzzing. T Blazytko, C Aschermann, M Schlögel, A Abbasi, S Schumilo, S Wörner, ... USENIX Security Symposium 19, 2019 | 75 | 2019 |
ETHBMC: A bounded model checker for smart contracts J Frank, C Aschermann, T Holz Proceedings of the 29th USENIX Conference on Security Symposium, 2757-2774, 2020 | 74 | 2020 |
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz USENIX Security Symposium, 2597-2614, 2021 | 39 | 2021 |
AURORA: Statistical crash analysis for automated root cause explanation T Blazytko, M Schlögel, C Aschermann, A Abbasi, J Frank, S Wörner, ... Proceedings of the 29th USENIX Conference on Security Symposium, 235-252, 2020 | 35 | 2020 |
Automatically proving termination and memory safety for programs with pointer arithmetic T Ströder, J Giesl, M Brockschmidt, F Frohn, C Fuhs, J Hensel, ... Journal of Automated Reasoning 58, 33-65, 2017 | 33 | 2017 |
AProVE: Termination and Memory Safety of C Programs: (Competition Contribution) T Ströder, C Aschermann, F Frohn, J Hensel, J Giesl Tools and Algorithms for the Construction and Analysis of Systems: 21st …, 2015 | 28 | 2015 |
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing S Schumilo, C Aschermann, A Abbasi, S Wörner, T Holz 27th Annual Network and Distributed System Security Symposium, NDSS, 2020 | 27 | 2020 |
AntiFuzz: Impeding Fuzzing Audits of Binary Executables. E Güler, C Aschermann, A Abbasi, T Holz USENIX Security Symposium, 1931-1947, 2019 | 24 | 2019 |
Nyx-net: network fuzzing with incremental snapshots S Schumilo, C Aschermann, A Jemmett, A Abbasi, T Holz Proceedings of the Seventeenth European Conference on Computer Systems, 166-180, 2022 | 21 | 2022 |
Lower bounds for runtime complexity of term rewriting F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder Journal of Automated Reasoning 59, 121-163, 2017 | 16 | 2017 |
Inferring lower bounds for runtime complexity F Frohn, J Giesl, J Hensel, C Aschermann, T Ströder 26th International Conference on Rewriting Techniques and Applications (RTA …, 2015 | 10 | 2015 |
Loki: Hardening code obfuscation against automated attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... 31st USENIX Security Symposium (USENIX Security 22), 3055-3073, 2022 | 9 | 2022 |
Technical Report: Hardening Code Obfuscation Against Automated Attacks M Schloegel, T Blazytko, M Contag, C Aschermann, J Basler, T Holz, ... arXiv preprint arXiv:2106.08913, 2021 | 1 | 2021 |
Algorithmic improvements for feedback-driven fuzzing. C Aschermann Ruhr University Bochum, Germany, 2020 | 1 | 2020 |