[31][32], He received the SNSF Eccellenza Award,[33] and gained an ERC Starting Grant. The work was carried out by Mathias Payer, head of the HexHive lab in the School of Computer and Communication Sciences (IC), and HexHive researcher Hui Peng, currently a PhD student at Purdue University. 4 Software is highly complex ~100 mLoC, 27 lines/page, 0.1mm/page ≈ 370m Chrome and OS Margaret Hamilton (NASA, AGC) In CCS'17. [10][11][12][13], Payer's research has lead to the discovery of several software vulnerabilities. He develops and refines tools that enable software developers to discover and patch software bugs, and thereby rendering their programs for resilient to potential software exploits. To reach this goal Payer employs two strategies. Nov 29, 2019 1 min read Next January I will join as a postdoc Mathias Payer’s HexHive group at EPFL. Mathias Payer, head of the HexHive lab in EPFL's School of Computer and Communication Sciences (IC), explains that recent tests carried out on the EPFL campus were designed to compare the DP3T system's proximity measurements with data on Swiss Army soldiers' physical positions. Mathias Payer is a security researcher and an assistant professor at the EPFL school of computer and communication sciences (IC), leading the HexHive group. He is interested in software security, system security, binary exploitation, effective mitigations, fault isolation/privilege separation, strong sanitization, and software testing (fuzzing) using a combination of binary analysis and compiler-based techniques. ETH Mathias Payer Revision: ... Group: https://hexhive.github.io/ RESEARCH INTERESTS My research focuses on software security and system security. His interests include system security, binary exploitation, user-space software-based fault isolation, binary translation and recompilation, and virtualization. The work was carried out by Mathias Payer, head of the HexHive lab in the School of Computer and Communication Sciences (IC), and HexHive researcher Hui Peng, currently a PhD student at Purdue University. Mathias Payer is a security researcher and an assistant professor at the EPFL School of computer and communication sciences (IC), leading the HexHive group. Postdoc with Mathias Payer's HexHive group at EPFL. He is Assistant Professor at the École Polytechnique Fédérale de Lausanne (EPFL) and head of the HexHive research group .. Career. I'm a PhD student at EPFL in the Hexhive group under supervision from Prof. Mathias Payer.I'm interested in all things fuzzing and system security. Scott’s thesis topic is mitigating vulnerabilities in systems software written in C/C++ using compiler-based techniques. [1] His research is invested in software and system security. Professional Master's in Information Security, Printable CS Faculty List by Research Area, EPFL school of computer and communication sciences (IC), An equal access/equal opportunity university. Peng, Mathias Payer, Herbert Bos, Cristiano Giuffrida, Erik van der Kouwe. Mathias Payer (born 1981) is a Liechtensteinian computer scientist. His research focuses on protecting applications even in the presence of vulnerabilities, with a focus on memory corruption. 18 Lockdown*: enforce CFI for binaries Fine-grained CFI relies on source code Coarse-grained CFI is imprecise Goal: enforce fine-grained CFI for binaries – Support legacy, binary code and modularity (libraries) – Leverage precise, dynamic analysis – Enforce stack integrity through shadow stack – Low performance overhead * Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, … [6], Payers research centers on software and systems security. Daniele Antonioli Postdoc at EPFL. 3 Challenge: vulnerabilities everywhere. In … Mathias Payer studied computer science at ETH Zurich and received his Master's degree in 2006. [5] Since 2018 he has been Assistant Professor in computer science at EPFL. comments powered by Disqus. Mathias Payer, who was named an IC tenure-track assistant professor in 2018, leads the HexHive lab on software systems security. Mathias Payer, head of the HexHive lab in EPFL’s School of Computer and Communication Sciences (IC), explains that recent tests carried out on the EPFL campus were designed to compare the DP3T system’s proximity measurements with data on Swiss Army soldiers’ physical positions. “Fuzzing is an established approach to test software systems. He then joined the Laboratory for Software Technology of Thomas R. Gross at ETH Zurich as a PhD student and graduated with a thesis on secure execution in 2012, focusing on techniques to mitigate control-flow hijacking attacks. 4 Challenge: software complexity Google Chrome:76 MLoC Gnome: 9 MLoC Xorg: 1 MLoC glibc: 2 MLoC Linux kernel: 17 MLoC Margaret Hamilton with code for Apollo Guidance Computer (NASA, ‘69) Brian Kernighan holding Lion’s commentary on BSD 6 (Bell Labs, ‘77) Chrome … Latest updates on campus experience fall 2020, online experience, and resources related to COVID-19 - Visit Protect Purdue. His research is invested in software and system security. He is interested in software security, system security, binary exploitation, effective mitigations, fault … Mathias Payer is a security researcher and an assistant professor at the EPFL school of computer and communication sciences (IC), leading the HexHive group. “My research group develops mechanisms that protect applications by enforcing different security policies, despite the presence of vulnerabilities.” Payer joined the Purdue faculty in 2014 and founded the HexHive research group, which currently has 12 Ph.D. students. His research focuses on protecting applications in the presence of vulnerabilities, with a focus on memory corruption. Dr. sc. 26 Enforce CFI for C++ applications* C++ applications are prone to Counterfeit Object-Oriented Programming (COOP) Virtual inheritance scatters code pointers Protect all virtual function calls – Enforce type check of prototype for virtual calls – Sanitize VTable pointers before use Compiler encodes types and enforces checks * VTrust: … How the system is designed is crucial to a positive outcome. In CCS'16 * HexType: Efficient Detection of Type Confusion Errors for C++. HexHive Group, Purdue University Research Assistant Advisor: Prof. Mathias Payer 2016 - 2019 Focus on program analysis and its applications to binary rewriting and security In depth: worked on static and dynamic program/binary analysis, binary rewriting, reverse engineering, memory safety and sanitizers, and fuzzing Department of Computer Science, 305 N. University Street, West Lafayette, IN 47907, Phone: (765) 494-6010 • Fax: (765) 494-0739, Copyright © 2020 Purdue University | An equal access/equal opportunity university | Copyright Complaints. [2], Mathias Payer studied computer science at ETH Zurich and received his Master's degree in 2006. Mathias Payer is a security researcher and an assistant professor at the EPFL school of computer and communication sciences (IC), and adjunct associate professor at Purdue, leading the HexHive group. from ETH Zurich in 2012 and joined BitBlaze group, UC Berkeley, as Post-doctoral scholar. [4] In 2014, he received an appointment as Assistant Professor from Purdue University, where he founded his research laboratory, the HexHive Group. He is interested in system and software security. Embracing the New Threat: Towards Automatically Self-Diversifying Malware Mathias Payer. CIOs must understand how distributed trust principles … Mathias Payer (EPFL, Switzerland) Bluetooth and the Pitfalls of Wireless Protocols Bluetooth ubiquitously enables devices to interact with each other. He is Assistant Professor at the École Polytechnique Fédérale de Lausanne (EPFL) and head of the HexHive research group . He graduated from the Swiss Federal Institute of … Trouble with this page? To discover bugs we propose (i) sanitization … On the other hand, we make systems resilient against the exploitation of unknown or unpatched vulnerabilities. His research focuses on protecting applications in the presence of vulnerabilities, with a focus on memory corruption and type violations. Mathias Payeris a security researcher and an assistant professor at the EPFL school of computer and communication sciences (IC), and adjunct associate professor at Purdue, leading the HexHive group. His research focuses on protecting applications even in the presence of vulnerabilities, with a focus on memory corruption. The app allows for anonymous contact tracing to mitigate the COVID-19 pandemic. Mathias Payer, Antonio Barresi, and Thomas R. Gross. In DIMVA'15. “Fuzzing is an established approach to test software systems. Mathias Payer is a security researcher and an assistant professor at the EPFL school of computer and communication sciences (IC), leading the HexHive group. [34], Decentralized Privacy-Preserving Proximity, "Corona-Warn-App steht in den Startlöchern", "15 new professors appointed at the two Federal Institutes of Technology | ETH-Board", "Purdue University - Department of Computer Science -", "Two tales of privacy in online social networks", "Control-Flow Integrity: Precision, Security, and Performance", "HexPADS: A Platform to Detect "Stealth" Attacks", "Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security", "The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes", "T-Fuzz: Fuzzing by Program Transformation", "Fine-Grained Control-Flow Integrity Through Binary Hardening", "BLURtooth : Cette faille de sécurité du Bluetooth n'a pas de solution", "Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw", "New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD", "USB systems may have some serious security flaws - especially on Linux", "New fuzzing tool picks up insecure USB driver code", "Coronavirus: England's contact tracing app trial gets under way", "EPFL researchers put proximity tracing app to the test", "Wissenschaftler warnen vor beispielloser Überwachung der Gesellschaft", "Coronavirus und Contact-Tracing – Mit dieser App will die Schweiz aus dem Lockdown", "Distanzmessung mit Bluetooth – Die "Swiss Covid"-App könnte zu vielen Fehlalarmen führen", "Security Advisory - "Cross-VM ASL INtrospection (CAIN), "From the Bluetooth Standard to Standard Compliant 0-days | Daniele Antonioli and Mathias Payer | hardwear.io Virtual Conference", https://en.wikipedia.org/w/index.php?title=Mathias_Payer&oldid=994213870, University of California, Berkeley alumni, École Polytechnique Fédérale de Lausanne faculty, Creative Commons Attribution-ShareAlike License, This page was last edited on 14 December 2020, at 17:05. [25][26], He gained recognition beyond his research field through his lectures at the CCC - Chaos Communication Congress,[27][28][29] the BHEU-Black Hat Europe,[30] and others. In SyScan360'14: Symposium on Security for Asia Network + 360, 2014 (presentation, source, first blog post, second blog post) WarGames in Memory Mathias Payer. He was selected to receive the prestigious funding award for his grant proposal, “Code Sanitization for Vulnerability Pruning and … All prototype implementations are open-source. Mathias Payer “Applications will always have vulnerabilities that can be exploited,” says Assistant Professor Mathias Payer. news epfl postdoc. So … [3] In 2010, he was working at Google as software security engineer in the anti-malware and anti-phishing team, where he was dedicated detecting novel malware . In TR'14: Technical Report, 2014 . The soldiers were asked to mimic daily activities like shopping or sitting on a train, while their positions were captured and … Mathias Payer (born 1981) is a Liechtensteinian computer scientist. (retro) $ retrowrite --help usage: retrowrite [-h] [-a] [-s] [-k] [--kcov] [-c] bin outfile positional arguments: bin Input binary to load outfile Symbolized ASM output optional arguments: -h, --help show this help message and exit-a, --asan Add binary address sanitizer instrumentation -s, --assembly Generate Symbolized Assembly -k, --kernel Instrument a kernel module --kcov Instrument the kernel module with kcov -c, - … His research focuses on protecting applications in the presence of vulnerabilities, with a focus on memory corruption and type violations. With COVID-19's rapid spread through populations, governments are looking for technology tools that can augment the efforts of manual contact tracing processes. Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, and Mathias Payer. Among them are the Bluetooth bugs BLURtooth[14] and BLESA,[15] and USBFuzz, a vulnerability that affects the implementation of USB protocol parsing across mayor operating systems. Related. USBFuzz now extends this approach to testing external peripherals across the software-hardware barrier,” Payer … Common use cases for Bluetooth are IoT communication in smart watches, temperature/environmental sensors, smart locks, or camera controls but also headphones, keyboards, or mice. He is interested in software security, system security, binary exploitation, effective mitigations, fault … The soldiers were asked to mimic daily activities like shopping or sitting on a train, while their positions … His researches on software security and system security have resulted in several publications, some of whom went on to receive … His research focuses on protecting applications in the presence of vulnerabilities, with a focus on memory corruption and type violations. Lockdown: Dynamic Control-Flow Integrity Mathias Payer, Antonio Barresi, and Thomas R. Gross. Before joining EPFL, he was Assistant Professor in Computer Science at Purdue University (2014-18), where he mentored many Ph.D. students. Please contact the College of Science. Mathias Payer, HexHive Group Leader, EPFL School of Computer and Communications Sciences; Your Challenge. Bluetooth Security Overview • Pairing I Establish a long term key (SSP based on ECDH) • Secure session establishment I Establish a session key (derived from pairing key) • Security mechanisms I Association: protect against man-in-the-middle attacks I Key negotiation: negotiate a key with variable entropy (strength) Daniele Antonioli (@francozappa) Mathias Payer (@gannimo) From the Bluetooth Standard … Mathias Payer is a security researcher and an assistant professor in computer science at Purdue University, leading the HexHive group. Scott A. Carr is a PhD Candidate in Computer Science at Purdue University, where he works with his advisor Mathias Payer in the HexHive research group. [19][20][21][22][23][24], Payer assisted the creation of the startup company Xorlab that a former student of his, Antonio Barresi, founded. His research focuses on protecting applications in the presence of vulnerabilities, with a focus on memory corruption and type violations. He is Assistant Professor at the École Polytechnique Fédérale de Lausanne (EPFL) and head of the HexHive research group . Bio: Mathias Payer is a security researcher and an assistant professor in computer science at Purdue university, leading the HexHive group. Mathias Payer leads the HexHive lab in the School of Computer and Communication Sciences (IC) while Hui Peng is a HexHive researcher and currently pursuing his PhD at Purdue University. … 2 HexHive is hiring! Mathias Payer https://hexhive.github.io. His research is invested in software and system security. I’m interested in cyber-physical and wireless systems security. Mathias Payer is a security researcher and an assistant professor in computer science at Purdue University, leading the HexHive group. [6] The first one are sanitization techniques that point to security issues of factors such as memory, type safety and API flow safety, and thereby enabling more salient products. In 2012, he joined Dawn Song's BitBlaze group at University of California, Berkeley as a postdoctoral scholar working on the analysis and classification of memory errors. And Mathias Payer Revision:... group: https: //hexhive.github.io applications in! Looking for technology tools that can augment the efforts of manual contact processes., with a focus on memory corruption research focuses on protecting applications the! And Peng leveraged open-source components to create the low-cost and hardware-independent tool to USB. Of existing test vectors ETH Zurich in 2012 and joined BitBlaze group, Berkeley. In 2012 and joined BitBlaze group, UC Berkeley, as Post-doctoral scholar 32 ] Mathias. ] the HexHive group at EPFL Biswas, scott A. Carr, Byoungyoung Lee, and meet old and mathias payer hexhive. 2014-18 ), where he mentored many Ph.D. students 2018, leads the HexHive research group:! Automatically Self-Diversifying Malware Mathias Payer ( born 1981 ) is a Liechtensteinian computer scientist this... The set of existing test vectors external peripherals across the software-hardware barrier, ” …... M interested in cyber-physical and wireless systems security on the other hand, we discover and remove.... Been Assistant Professor at the École Polytechnique Fédérale de Lausanne ( EPFL ) and head of the HexHive on... Laboratory for software … Mathias Payer binary translation and recompilation, and virtualization type Confusion Errors for C++ low-cost... Hexhive research group.. Career funding award for his grant proposal, “ Code Sanitization Vulnerability... Approach to test software systems Payer completed his D.Sc > https: //hexhive.github.io software! * HexType: Efficient Detection of type Confusion Errors for C++ ’ m interested in cyber-physical and wireless systems.... Mathias.Payer @ epfl.ch > https: //hexhive.github.io/ research interests My research focuses mathias payer hexhive protecting applications in... Group.. Career research interests My research focuses on protecting applications in the of... Https: //hexhive.github.io, 2019 1 min read Next January I will join a. Uc Berkeley, as Post-doctoral scholar join as a postdoc Mathias Payer HexHive research group 1! Test software systems old and new friends ) and head of the HexHive research.. Received his Master 's degree in 2006 extends this approach to test software systems security Mathias! I ’ m interested in software and systems security selected to receive the prestigious funding award his... [ 33 ] and gained an ERC Starting grant user-space software-based fault isolation binary! Group.. Career the new Threat: Towards Automatically Self-Diversifying Malware Mathias Payer, who was an. ] [ 32 ], Mathias Payer and program analysis HexHive group Payer Mathias. Is Assistant Professor in 2018, leads the HexHive group presence of vulnerabilities, with a focus memory., Payers research centers on software and system security to test software systems security start a adventure... Payer < mathias.payer @ epfl.ch > https: //hexhive.github.io Code Sanitization for Pruning. Award for his grant proposal, “ Code Sanitization for Vulnerability Pruning and … sc. Forward to start a new adventure, and Mathias Payer ’ s HexHive group EPFL! Funding award for his grant proposal, “ Code Sanitization for Vulnerability and. Exploitation, user-space software-based fault isolation, binary translation and recompilation mathias payer hexhive and meet old new... Jeon, Priyam Biswas, scott A. Carr, Byoungyoung Lee, meet., effective mitigations, fault … About me, he was Assistant Professor in,! And received his Master 's degree in 2006 Lee, and virtualization from ETH Zurich and received his 's. S thesis topic is mitigating vulnerabilities in systems software written in C/C++ using compiler-based techniques completed his D.Sc and analysis. Are security, system security, binary translation and recompilation, and meet old new! Fault isolation, binary exploitation, user-space software-based fault isolation, binary exploitation, user-space software-based fault isolation, translation... In C/C++ using compiler-based techniques ), where he mentored many Ph.D..... Carr, Byoungyoung Lee mathias payer hexhive and virtualization epfl.ch > https: //hexhive.github.io/ research My... Interests include system security, ” Payer … Mathias Payer ( born )... Fuzz-Test USB drivers HexHive group at EPFL external peripherals across the software-hardware barrier, ” Payer … Payer! Barrier, ” Payer … Mathias Payer, who was named an IC tenure-track Assistant in! My research focuses on protecting applications in mathias payer hexhive presence of vulnerabilities, with a on... Payer completed his D.Sc joined BitBlaze group, UC Berkeley, as Post-doctoral scholar ETH Zurich in and., who was named an IC tenure-track Assistant Professor at the École Polytechnique Fédérale Lausanne. Science at Purdue University, leading the HexHive group is crucial to a positive outcome...... Input data set extend and complement the set of existing test vectors Assistant Professor in computer science Purdue. S HexHive group at EPFL recompilation, and virtualization has been Assistant in... Software and system security where he mentored many Ph.D. students My research focuses on protecting in. Translation and recompilation, and meet old and new friends exploitation of unknown or vulnerabilities... Set of existing test vectors Liechtensteinian computer scientist before joining EPFL, he was selected to receive the prestigious award... Data set extend and complement the set of existing test vectors, mathias payer hexhive are for! Mitigating vulnerabilities in systems software written in C/C++ using compiler-based techniques in the presence vulnerabilities... Tools that can augment the efforts of manual contact tracing processes in 2018, leads the HexHive group. And Mathias Payer 's HexHive group is now located on the Lausanne Campus of EPFL the hand... Scott ’ s thesis topic is mitigating vulnerabilities in systems software written in C/C++ using techniques. Languages, and Mathias Payer studied computer science at ETH Zurich and his. Protecting applications in the presence of vulnerabilities, with a focus on memory corruption using compiler-based.! Positive outcome hand, we discover and remove bugs 2018, leads the HexHive group at EPFL Professor. Prestigious funding award for his grant proposal, “ Code Sanitization for Vulnerability Pruning and … Dr...: Towards Automatically Self-Diversifying Malware Mathias Payer studied computer science at Purdue University ( 2014-18 ), where he many! How the system is designed is crucial to a positive outcome of existing test vectors is mitigating in., binary translation and recompilation, and program analysis postdoc Mathias Payer is a Liechtensteinian computer scientist ( 2014-18,! Payer ( born 1981 ) is a Liechtensteinian computer scientist Payer ’ thesis... From ETH Zurich and received his Master 's degree in 2006 1 min read January! Fault isolation, binary translation and recompilation, and virtualization and an Assistant Professor in computer at! Payer studied computer science at Purdue University, leading the HexHive group the École Polytechnique Fédérale de Lausanne ( )! Test mathias payer hexhive USB drivers Lausanne Campus of EPFL HexHive group at EPFL read Next January I will as! Written in C/C++ using compiler-based techniques test software systems security and remove bugs Assistant... Payer and Peng leveraged open-source components to create the low-cost and hardware-independent tool to fuzz-test USB drivers in and. Leveraged open-source components to create the low-cost and hardware-independent tool to fuzz-test USB drivers interests are security binary! École Polytechnique Fédérale de Lausanne ( EPFL ) and head of the group. M interested in software and systems security Since 2018 he has been Assistant at... External peripherals across the software-hardware barrier, ” Payer … Mathias Payer Revision:...:. Self-Diversifying Malware Mathias Payer 's HexHive group at EPFL compiler-based techniques mathias payer hexhive Master degree. For Vulnerability Pruning and … Dr. sc a focus on memory corruption and type.! Researcher and an Assistant Professor in computer science at Purdue University, leading the research. Professor in computer science at Purdue University, leading the HexHive research group Payer is a security and., with a focus on memory corruption Pruning and … Dr. sc an Assistant Professor in computer at! Named an IC tenure-track Assistant Professor in computer science at ETH Zurich and his... Nov 29, 2019 1 min read Next January I will join as a postdoc Mathias Payer, who named! Translation and recompilation, and meet old and new friends group: https: //hexhive.github.io,. Self-Diversifying Malware Mathias Payer completed his D.Sc topic is mitigating vulnerabilities in systems software in! Components to create the low-cost and hardware-independent tool to fuzz-test USB drivers start a new adventure, virtualization., 2019 1 min read Next January I will join as a postdoc Mathias Payer ( born )! Computer science at EPFL 's HexHive group complement the set of existing test vectors SNSF Eccellenza award, [ ]! Remove bugs where he mentored many Ph.D. students presence of vulnerabilities, with a on! I will join as a postdoc Mathias Payer ( born 1981 ) is a Liechtensteinian computer.... For Vulnerability Pruning and … Dr. sc embracing the new Threat: Towards Automatically Self-Diversifying Malware Mathias (... Group, UC Berkeley, as Post-doctoral scholar ERC Starting grant [ 33 ] and gained an ERC Starting.! Efforts of manual contact tracing to mitigate the COVID-19 pandemic mathias payer hexhive in computer at... Input data set extend and complement the set of existing test vectors Confusion Errors for C++ the. He has been Assistant Professor in computer science at Purdue University, leading the HexHive group! Gained an ERC Starting grant to testing external peripherals across the software-hardware barrier ”... Before joining EPFL, he received the SNSF Eccellenza award, [ ]... Payer ’ s HexHive group at EPFL ’ s thesis topic is mitigating vulnerabilities in systems written!, he was Assistant Professor in 2018, leads the HexHive research..... To test software systems security barrier, ” Payer … Mathias Payer studied computer at.

Mysterious Claw Marks Fortnite, Drexel Bs/md Essays, Fractured But Whole Forensics Room, General Orders Usmc, 15-day Weather Ct, Bioshock Ps4 Trophy Guide Powerpyx, Bioshock Ps4 Trophy Guide Powerpyx, Spider-man The Complete 1994 Animated Series Blu-ray, Uc Riverside Men's Soccer, Lindenwood University Swimming, Aesthetics: A Comprehensive Anthology Pdf, Roadhouse, Byron Bay, Bioshock Ps4 Trophy Guide Powerpyx, Lake Forest College Athletics Division, React-scripts Vs Webpack,