Graph matching networks for learning the similarity of graph structured objects Y Li, C Gu, T Dullien, O Vinyals, P Kohli International conference on machine learning, 3835-3845, 2019 | 596 | 2019 |
Exploiting the DRAM rowhammer bug to gain kernel privileges M Seaborn, T Dullien Black Hat 15, 71, 2015 | 486 | 2015 |
Structural comparison of executable objects H Flake DIMVA 2004, July 6-7, Dortmund, Germany, 2004 | 352 | 2004 |
Graph-based comparison of executable objects (english version) T Dullien, R Rolles Sstic 5 (1), 3, 2005 | 350 | 2005 |
REIL: A platform-independent intermediate representation of disassembled code for static code analysis T Dullien, S Porst Proceeding of CanSecWest, 1-7, 2009 | 165 | 2009 |
Weird machines, exploitability, and provable unexploitability T Dullien IEEE Transactions on Emerging Topics in Computing 8 (2), 391-403, 2017 | 71 | 2017 |
A Framework for Automated {Architecture-Independent} Gadget Search T Dullien, T Kornau, RP Weinmann 4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010 | 71 | 2010 |
Automated attacker correlation for malicious code T Dullien, E Carrera, SM Eppler, S Porst Proceedings of the NATO IST Symposium (Tallinn, Estonia), 26.1-26.10, 2010 | 28 | 2010 |
Exploitation and state machines T Dullien, H Flake Proceedings of Infiltrate, 2011 | 26 | 2011 |
Exploiting the DRAM rowhammer bug to gain kernel privileges (2015) M Seaborn, T Dullien URL: http://googleprojectzero. blogspot. co. at/2015/03/exploiting-dram …, 0 | 16 | |
Algebraic precomputations in differential and integral cryptanalysis M Albrecht, C Cid, T Dullien, JC Faugere, L Perret Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011 | 10 | 2011 |
Ruhr universitaet Bochum. Graph-based comparison of executable objects T Dullien, R Rolles University of Technology in Florida, 2005 | 7 | 2005 |
Test DRAM for bit flips caused by the rowhammer problem M Seaborn, T Dullien | 6 | 2015 |
Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges M Seaborn, T Dullien Project Zero. Mar 9, 2015 | 5 | 2015 |
Method and System for Recognizing Malware T Dullien US Patent App. 13/030,404, 2011 | 5 | 2011 |
Automatisierte Signaturgenerierung für Malware-Stämme C Blichmann PhD thesis, Technical University of Dortmund, 2008 | 5 | 2008 |
Algebraic precomputations in differential cryptanalysis M Albrecht, C Cid, T Dullien, JC Faugere, L Perret ECRYPT Tools for Cryptanalysis Workshop, 2010 | 4 | 2010 |
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281) S Zennou, SK Debray, T Dullien, A Lakhothia Dagstuhl Reports 7 (7), 2018 | 3 | 2018 |
Deep neural network system for similarity-based graph representations Y Li, C Gu, T Dullien, O Vinyals, P Kohli US Patent App. 18/087,704, 2023 | 1 | 2023 |
Method for characterization of a computer program part T Dullien, S Meyer-Eppler US Patent 8,689,327, 2014 | 1 | 2014 |