default search action
Moritz Schloegel
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Moritz Schloegel:
Automated program analysis: reproducibility, flexibility requirements, and risks. Ruhr University Bochum, Germany, 2024 - [c20]Felix Weissberg
, Jonas Möller
, Tom Ganz
, Erik Imgrund
, Lukas Pirch
, Lukas Seidel
, Moritz Schloegel
, Thorsten Eisenhofer
, Konrad Rieck
:
SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing. AsiaCCS 2024 - [c19]Lukas Bernhard
, Nico Schiller
, Moritz Schloegel
, Nils Bars
, Thorsten Holz
:
DarthShader: Fuzzing WebGPU Shader Translators & Compilers. CCS 2024: 690-704 - [c18]Nils Bars
, Moritz Schloegel
, Nico Schiller
, Lukas Bernhard
, Thorsten Holz
:
No Peer, no Cry: Network Application Fuzzing via Fault Injection. CCS 2024: 750-764 - [c17]Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench
, Thorsten Holz:
SoK: Prudent Evaluation Practices for Fuzzing. SP 2024: 1974-1993 - [c16]Emre Güler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp Görz, Xinyi Xu, Cemal Kaygusuz, Thorsten Holz:
Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities. USENIX Security Symposium 2024 - [c15]Joschua Schilling, Andreas Wendler, Philipp Görz, Nils Bars, Moritz Schloegel, Thorsten Holz:
A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard. USENIX Security Symposium 2024 - [c14]Johannes Willbold
, Moritz Schloegel
, Robin Bisping
, Martin Strohmeier
, Thorsten Holz
, Vincent Lenders
:
VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices. WISEC 2024: 288-299 - [i5]Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz:
SoK: Prudent Evaluation Practices for Fuzzing. CoRR abs/2405.10220 (2024) - [i4]Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz:
No Peer, no Cry: Network Application Fuzzing via Fault Injection. CoRR abs/2409.01059 (2024) - [i3]Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz:
DarthShader: Fuzzing WebGPU Shader Translators & Compilers. CoRR abs/2409.01824 (2024) - 2023
- [c13]Nico Schiller, Xinyi Xu, Lukas Bernhard, Nils Bars, Moritz Schloegel, Thorsten Holz:
Novelty Not Found: Adaptive Fuzzer Restarts to Improve Input Space Coverage (Registered Report). FUZZING 2023: 12-20 - [c12]Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID. NDSS 2023 - [c11]Johannes Willbold, Moritz Schloegel
, Manuel Vögele, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi:
Space Odyssey: An Experimental Software Security Analysis of Satellites. SP 2023: 1-19 - [c10]Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz:
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge. USENIX Security Symposium 2023: 1847-1864 - [c9]Tobias Scharnowski, Simon Wörner, Felix Buchmann, Nils Bars, Moritz Schloegel, Thorsten Holz:
Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs. USENIX Security Symposium 2023: 2885-2902 - [c8]Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy:
Instructions Unclear: Undefined Behaviour in Cellular Network Specifications. USENIX Security Symposium 2023: 3475-3492 - 2022
- [c7]Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel
, Tim Blazytko, Thorsten Holz:
JIT-Picking: Differential Fuzzing of JavaScript Engines. CCS 2022: 351-364 - [c6]Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi:
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. USENIX Security Symposium 2022: 1239-1256 - [c5]Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:
Loki: Hardening Code Obfuscation Against Automated Attacks. USENIX Security Symposium 2022: 3055-3073 - 2021
- [c4]Moritz Schloegel
, Tim Blazytko, Julius Basler, Fabian Hemmer, Thorsten Holz:
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. ESORICS (1) 2021: 218-239 - [i2]Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:
Loki: Hardening Code Obfuscation Against Automated Attacks. CoRR abs/2106.08913 (2021) - 2020
- [c3]Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. USENIX Security Symposium 2020: 235-252
2010 – 2019
- 2019
- [c2]Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner, Thorsten Holz:
GRIMOIRE: Synthesizing Structure while Fuzzing. USENIX Security Symposium 2019: 1985-2002 - [i1]Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar:
A Look at the Dark Side of Hardware Reverse Engineering - A Case Study. CoRR abs/1910.01519 (2019) - 2017
- [c1]Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel
, Christof Paar:
A look at the dark side of hardware reverse engineering - a case study. IVSW 2017: 95-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint