Mathias Payer mainly investigates Computer security, Memory corruption, Exploit, Memory safety and Control flow. His work on Arbitrary code execution is typically connected to Transmission as part of general Computer security study, connecting several disciplines of science. His work carried out in the field of Memory corruption brings together such families of science as Distributed computing, Binary translation, Return-oriented programming, Range and Protocol.
His studies in Exploit integrate themes in fields like Heartbleed, Certificate, The Internet and Vulnerability. In his research on the topic of Memory safety, Memory management and Address space layout randomization is strongly related with Software bug. His research in Control flow focuses on subjects like Implementation, which are connected to Control-flow integrity, Leverage and Compiler.
His main research concerns Computer security, Operating system, Memory corruption, Software and Embedded system. In his research, Return-oriented programming is intimately related to Compiler, which falls under the overarching field of Computer security. His research in Operating system intersects with topics in Garbage collection and Function pointer.
Mathias Payer combines subjects such as Executable, Memory safety, Loader, Memory protection and Control flow with his study of Memory corruption. His study in Memory safety is interdisciplinary in nature, drawing from both Buffer overflow, Heartbleed and Memory management. His Software research is multidisciplinary, incorporating perspectives in Data mining, Service and Code.
Mathias Payer mostly deals with Fuzz testing, Computer security, Software, Bluetooth Low Energy and Computer network. His Fuzz testing research includes themes of Software bug and Database. His Software bug research includes themes of Machine learning, Compile time and Artificial intelligence, Benchmark.
His research in Computer security intersects with topics in Tracing and Upload. He interconnects Python, Construct and Isolation in the investigation of issues within Software. His Bluetooth Low Energy study integrates concerns from other disciplines, such as Session and Spoofing attack.
His scientific interests lie mostly in Computer security, Tracing, Upload, Pandemic and Then test. His Tracing research is multidisciplinary, incorporating elements of Privacy preserving, Process, Identity and Data Protection Act 1998. His Upload research includes elements of Bluetooth, Identifier, Interoperability and Beacon.
The various areas that Mathias Payer examines in his Pandemic study include Exposure Notification, Severe acute respiratory syndrome coronavirus, Contact tracing and Severe acute respiratory syndrome coronavirus 2. Then test is connected with 2019-20 coronavirus outbreak and Medicine in his study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The Matter of Heartbleed
Zakir Durumeric;Frank Li;James Kasten;Johanna Amann.
internet measurement conference (2014)
SoK: Eternal War in Memory
L. Szekeres;M. Payer;Tao Wei;Dawn Song.
ieee symposium on security and privacy (2013)
Code-pointer integrity
Volodymyr Kuznetsov;László Szekeres;Mathias Payer;George Candea.
operating systems design and implementation (2014)
Control-flow bending: on the effectiveness of control-flow integrity
Nicolas Carlini;Antonio Barresi;Mathias Payer;David Wagner.
usenix security symposium (2015)
Control-Flow Integrity: Precision, Security, and Performance
Nathan Burow;Scott A. Carr;Joseph Nash;Per Larsen.
ACM Computing Surveys (2017)
T-Fuzz: Fuzzing by Program Transformation
Hui Peng;Yan Shoshitaishvili;Mathias Payer.
ieee symposium on security and privacy (2018)
Decentralized Privacy-Preserving Proximity Tracing
Carmela Troncoso;Mathias Payer;Jean-Pierre Hubaux;Marcel Salathé.
arXiv: Cryptography and Security (2020)
Decentralized Privacy-Preserving Proximity Tracing
Carmela Troncoso;Mathias Payer;Jean-Pierre Hubaux;Marcel Salathé.
IEEE Data(base) Engineering Bulletin (2020)
Fine-Grained Control-Flow Integrity Through Binary Hardening
Mathias Payer;Antonio Barresi;Thomas R. Gross.
international conference on detection of intrusions and malware and vulnerability assessment (2015)
HexPADS: A Platform to Detect Stealth Attacks
Mathias Payer.
engineering secure software and systems (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
ETH Zurich
University of California, Berkeley
Graz University of Technology
Pennsylvania State University
University of Passau
University of Vienna
École Polytechnique Fédérale de Lausanne
Purdue University West Lafayette
Purdue University West Lafayette
ETH Zurich
World Bank
University of Chicago
Liaoning University of Technology
Oracle (United States)
York University
KTH Royal Institute of Technology
Yale University
Northwestern University
University of Minnesota
University of Calgary
University of Wisconsin–Madison
Agricultural Research Organization
University of Ottawa
University of Miami
KU Leuven
Cardiff University