Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Schloegel, M

Searching in archive cs. Search in all archives.
.
  1. SoK: Prudent Evaluation Practices for Fuzzing

    Authors: Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz

    Abstract: Fuzzing has proven to be a highly effective approach to uncover software bugs over the past decade. After AFL popularized the groundbreaking concept of lightweight coverage feedback, the field of fuzzing has seen a vast amount of scientific work proposing new techniques, improving methodological aspects of existing strategies, or porting existing methods to new domains. All such work must demonstr… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2106.08913  [pdf, other

    cs.CR

    Technical Report: Hardening Code Obfuscation Against Automated Attacks

    Authors: Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi

    Abstract: Software obfuscation is a crucial technology to protect intellectual property and manage digital rights within our society. Despite its huge practical importance, both commercial and academic state-of-the-art obfuscation methods are vulnerable to a plethora of automated deobfuscation attacks, such as symbolic execution, taint analysis, or program synthesis. While several enhanced obfuscation techn… ▽ More

    Submitted 17 June, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

  3. A Look at the Dark Side of Hardware Reverse Engineering -- A Case Study

    Authors: Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar

    Abstract: A massive threat to the modern and complex IC production chain is the use of untrusted off-shore foundries which are able to infringe valuable hardware design IP or to inject hardware Trojans causing severe loss of safety and security. Similarly, market dominating SRAM-based FPGAs are vulnerable to both attacks since the crucial gate-level netlist can be retrieved even in field for the majority of… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: 2017 IEEE 2nd International Verification and Security Workshop (IVSW)