On the Practicality of Input Crafting with Symbolic Execution on Binary Code

Betreuer: Behrad Garmany
Beginn: as soon as possible

Honeypot based on Google Dorks

Betreuer: Florian Quinkert
Beginn: as soon as possible

On the Impact of Flag Virtualization in Virtual Machines

Betreuer: Moritz Contag
Beginn: immediately

Symbol Recovery for Engine Control Unit Firmware

Betreuer: Moritz Contag
Beginn: as soon as possible

Tracking the Evolution of Modern Car Firmware

Betreuer: Moritz Contag
Beginn: as soon as possible

Tackling 3rd Generation Code-Reuse Attacks

Betreuer: Moritz Contag, Andre Pawlowski
Beginn: ab sofort

Modelling CPUs in SMT solvers

Betreuer: Tim Blazytko
Beginn: as soon as possible

Gray Box Fuzzing for Web Security

Betreuer: Cornelius Aschermann
Beginn: as soon as possible

Identifying Function Parameters in Binaries

Betreuer: Cornelius Aschermann
Beginn: as soon as possible

Bounded model checking for ROP gadget chaining

Betreuer: Tim Blazytko
Beginn: as soon as pos­si­ble

Comparative evaluation of intermediate languages

Betreuer: Tim Blazytko
Beginn: as soon as pos­si­ble

Attacks against DNS infrastructure & defenses

Betreuer: Teemu Rytilahti
Beginn: as soon as possible

IP squatting in the cloud

Betreuer: Teemu Rytilahti
Beginn: as soon as possible

Information Leak Detection via Dual Execution of a Script Interpreter

Betreuer: Andre Pawlowski
Beginn: as soon as possible

VTable Hierarchy Reconstruction on ARM

Betreuer: Andre Pawlowski
Beginn: as soon as possible

QNX 7.0 Real-Time Operating System Micro-Kernel Coverage-Based Fuzzing

Betreuer: Ali Abbasi
Beginn: as soon as possible
Seite: