Selected peer-reviewed publications and theses (papers include links to PDFs, code, slides, and recordings where available).
Jit-Picking: Differential Fuzzing of JavaScript Engines
ACM Conference on Computer and Communications Security 2022 (CCS 2022)
Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz.
paper ·
code
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains
ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses 2022 (SCORED'22)
Frederick Barr-Smith, Tim Blazytko, Richard Baker, Ivan Martinovic.
paper
Loki: Hardening Code Obfuscation Against Automated Attacks
USENIX Security Symposium 2022 (USENIX
Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi.
paper ·
slides ·
recording
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
European Symposium on Research in Computer Security (
Moritz Schloegel, Tim Blazytko, Julius Basler, Fabian Hemmer, Thorsten Holz.
paper ·
code
Reasoning about Software Security via Synthesized Behavioral Substitutes
Doctoral Thesis (2020)
Tim Blazytko.
pdf
Aurora: Statistical Crash Analysis for Automated Root Cause Explanation
USENIX Security Symposium 2019 (USENIX
Tim Blazytko, Moritz Schloegel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Woerner, Thorsten Holz.
paper ·
slides ·
recording ·
code
Grimoire: Synthesizing Structure while Fuzzing
USENIX Security Symposium 2019 (USENIX
Tim Blazytko, Cornelius Aschermann, Moritz Schloegel, Ali Abbasi, Sergej Schumilo, Simon Woerner, Thorsten Holz.
paper ·
slides ·
recording ·
code
Redqueen: Fuzzing with Input-to-State Correspondence
Network and Distributed System Security Symposium (
Cornelis Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz.
paper ·
slides ·
recording ·
code
Towards Automated Generation of Exploitation Primitives for Web Browsers
Annual Computer Security Applications Conference (
Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz.
paper
Syntia: Synthesizing the Semantics of Obfuscated Code
USENIX Security Symposium 2017 (USENIX
Tim Blazytko, Moritz Contag, Cornelius Aschermann, Thorsten Holz.
paper ·
slides ·
recording ·
code
Towards Automated Discovery of Crash-Resistant Primitives in Binaries
IEEE/IFIP International Conference on Dependable Systems and Networks 2017 (
Benjamin Kollenda, Enes Goktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, R.K. Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz.
paper
Static Data Flow Analysis and Constraint Solving to Craft Inputs for Binary Programs
M.Sc. Thesis (2015)
Tim Blazytko.
pdf
I serve on program committees and as a reviewer for conferences, workshops, and journals in security, reverse engineering, and software engineering.