Follow
Thomas Dullien
Thomas Dullien
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Graph matching networks for learning the similarity of graph structured objects
Y Li, C Gu, T Dullien, O Vinyals, P Kohli
International conference on machine learning, 3835-3845, 2019
5962019
Exploiting the DRAM rowhammer bug to gain kernel privileges
M Seaborn, T Dullien
Black Hat 15, 71, 2015
4862015
Structural comparison of executable objects
H Flake
DIMVA 2004, July 6-7, Dortmund, Germany, 2004
3522004
Graph-based comparison of executable objects (english version)
T Dullien, R Rolles
Sstic 5 (1), 3, 2005
3502005
REIL: A platform-independent intermediate representation of disassembled code for static code analysis
T Dullien, S Porst
Proceeding of CanSecWest, 1-7, 2009
1652009
Weird machines, exploitability, and provable unexploitability
T Dullien
IEEE Transactions on Emerging Topics in Computing 8 (2), 391-403, 2017
712017
A Framework for Automated {Architecture-Independent} Gadget Search
T Dullien, T Kornau, RP Weinmann
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
712010
Automated attacker correlation for malicious code
T Dullien, E Carrera, SM Eppler, S Porst
Proceedings of the NATO IST Symposium (Tallinn, Estonia), 26.1-26.10, 2010
282010
Exploitation and state machines
T Dullien, H Flake
Proceedings of Infiltrate, 2011
262011
Exploiting the DRAM rowhammer bug to gain kernel privileges (2015)
M Seaborn, T Dullien
URL: http://googleprojectzero. blogspot. co. at/2015/03/exploiting-dram …, 0
16
Algebraic precomputations in differential and integral cryptanalysis
M Albrecht, C Cid, T Dullien, JC Faugere, L Perret
Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011
102011
Ruhr universitaet Bochum. Graph-based comparison of executable objects
T Dullien, R Rolles
University of Technology in Florida, 2005
72005
Test DRAM for bit flips caused by the rowhammer problem
M Seaborn, T Dullien
62015
Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges
M Seaborn, T Dullien
Project Zero. Mar 9, 2015
52015
Method and System for Recognizing Malware
T Dullien
US Patent App. 13/030,404, 2011
52011
Automatisierte Signaturgenerierung für Malware-Stämme
C Blichmann
PhD thesis, Technical University of Dortmund, 2008
52008
Algebraic precomputations in differential cryptanalysis
M Albrecht, C Cid, T Dullien, JC Faugere, L Perret
ECRYPT Tools for Cryptanalysis Workshop, 2010
42010
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281)
S Zennou, SK Debray, T Dullien, A Lakhothia
Dagstuhl Reports 7 (7), 2018
32018
Deep neural network system for similarity-based graph representations
Y Li, C Gu, T Dullien, O Vinyals, P Kohli
US Patent App. 18/087,704, 2023
12023
Method for characterization of a computer program part
T Dullien, S Meyer-Eppler
US Patent 8,689,327, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20