Schloegel, Moritz
13  results:
Search for persons X
?
1

Automated program analysis 

reproducibility, flexibility requirements, and risks 
 
?
3

SoK: Where to Fuzz? Assessing Target Selection Methods in D..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Weissberg, Felix ; Möller, Jonas ; Ganz, Tom... - p. 1539-1553 , 2024
 
?
4

VSAsTer: Uncovering Inherent Security Issues in Current VSA..:

, In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
5

Novelty Not Found: Adaptive Fuzzer Restarts to Improve Inpu..:

, In: Proceedings of the 2nd International Fuzzing Workshop,
Schiller, Nico ; Xu, Xinyi ; Bernhard, Lukas... - p. 12-20 , 2023
 
?
6

Space Odyssey: An Experimental Software Security Analysis o..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
 
?
7

JIT-Picking : Differential Fuzzing of JavaScript Engines:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
 
?
8

Towards Automating Code-Reuse Attacks Using Synthesized Gad..:

, In: Computer Security – ESORICS 2021; Lecture Notes in Computer Science,
Schloegel, Moritz ; Blazytko, Tim ; Basler, Julius.. - p. 218-239 , 2021
 
?
10

Fuzzware: Using Precise MMIO Modeling for Effective Firmwar..:

Scharnowski, Tobias ; Bars, Nils ; Schloegel, Moritz...
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce.  , 2022
 
?
11

Fuzzware: Using Precise MMIO Modeling for Effective Firmwar..:

Scharnowski, Tobias ; Bars, Nils ; Schloegel, Moritz...
https://research.vu.nl/en/publications/f396ad96-5de0-4051-ba57-42f57d76afce.  , 2022
 
1-13