Mathias Payer
Mathias Payer
EPFL IC, HexHive Laboratory
Verified email at - Homepage
Cited by
Cited by
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
SoK: Eternal War in Memory
L Szekeres, M Payer, T Wei, D Song
Security and Privacy (SP), 2013 IEEE Symposium on, 48-62, 2013
Code-pointer integrity
K Volodymyr, S Laszlo, P Mathias, C George, R Sekar
10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014
Control-flow bending: On the effectiveness of control-flow integrity
N Carlini, A Barresi, M Payer, D Wagner, TR Gross
24th {USENIX} Security Symposium ({USENIX} Security 15), 161-176, 2015
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili, M Payer
2018 IEEE Symposium on Security and Privacy (SP), 697-710, 2018
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Fine-Grained Control-Flow Integrity through Binary Hardening
M Payer, A Barresi, TR Gross
DIMVA '15: Conference on Detection of Intrusions and Malware & Vulnerability …, 2015
HexPADS: a platform to detect “stealth” attacks
M Payer
International Symposium on Engineering Secure Software and Systems, 138-154, 2016
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016
SMoTherSpectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
VTrust: Regaining Trust on Virtual Calls.
C Zhang, D Song, SA Carr, M Payer, T Li, Y Ding, C Song
NDSS, 2016
SoK: Shining light on shadow stacks
N Burow, X Zhang, M Payer
2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019
Fine-grained user-space security through virtualization
M Payer, TR Gross
VEE'11 46 (7), 157-168, 2011
The Correctness-Security Gap in Compiler Optimization
V D’Silva, M Payer, D Song
Second Language-theoretic Security (LangSec) IEEE S&P Workshop, 2015
Protecting bare-metal embedded systems with privilege overlays
AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ...
2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Typesan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
{CAIN}: Silently Breaking {ASLR} in the Cloud
A Barresi, K Razavi, M Payer, TR Gross
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
HI-CFG: Construction by binary analysis and application to attack polymorphism
D Caselden, A Bazhanyuk, M Payer, S McCamant, D Song
Computer Security–ESORICS 2013, 164-181, 2013
The system can't perform the operation now. Try again later.
Articles 1–20