Andre Pawlowski
Andre Pawlowski
Chair for Systems Security, Ruhr-University Bochum
Verified email at rub.de - Homepage
TitleCited byYear
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawlowski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
1002016
MARX: Uncovering Class Hierarchies in C++ Programs.
A Pawlowski, M Contag, V van der Veen, C Ouwehand, T Holz, H Bos, ...
NDSS, 2017
232017
How they did it: An analysis of emission defeat devices in modern automobiles
M Contag, G Li, A Pawlowski, F Domke, K Levchenko, T Holz, S Savage
2017 IEEE Symposium on Security and Privacy (SP), 231-250, 2017
212017
A practical investigation of identity theft vulnerabilities in eduroam
S Brenza, A Pawlowski, C Pöpper
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
192015
Probfuscation: an obfuscation approach using probabilistic control flows
A Pawlowski, M Contag, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2016
142016
Detile: Fine-grained information leak detection in script engines
R Gawlik, P Koppe, B Kollenda, A Pawlowski, B Garmany, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2016
72016
Cristiano Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
V van der Veen, E Goktas, M Contag, A Pawlowski, X Chen, S Rawat, ...
IEEE S&P, 0
6
Towards automated application-specific software stacks
N Davidsson, A Pawlowski, T Holz
European Symposium on Research in Computer Security, 88-109, 2019
12019
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching
A Pawlowski, V van der Veen, D Andriesse, E van der Kouwe, T Holz, ...
Proceedings of the 35th Annual Computer Security Applications Conference, 97-112, 2019
2019
On the weaknesses of function table randomization
M Contag, R Gawlik, A Pawlowski, T Holz
International Conference on Detection of Intrusions and Malware, and …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–10