Recent publications
Article
Corteggiani, N, Camurati, G, Muench, M, Poeplau, S & Francillon, A 2021, 'SoC Security Evaluation: Reflections on Methodology and Tooling', IEEE Design and Test, vol. 38, no. 1, pp. 7-13. https://doi.org/10.1109/MDAT.2020.3013827
Conference contribution
Duta, V, Freyer, F, Pagani, F, Muench, M & Giuffrida, C 2023, Let Me Unwind That For You: Exceptions to Backward-Edge Protection. in NDSS Symposium 2023 Accepted Papers., s295, The Internet Society, pp. 1-18, Network and Distributed System Security (NDSS) Symposium 2023, San Diego, California, United States, 27/02/23. https://doi.org/10.14722/ndss.2023.232295
Hertogh, M, Wiesinger, M, Österlund, S, Muench, M, Amit, N, Bos, H & Giuffrida, C 2023, Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. in RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. RAID: Research in Attacks, Intrusions and Defenses, Association for Computing Machinery (ACM), RAID 2023, Hong Kong, Hong Kong, 16/10/23.
Barberis, E, Frigo, P, Muench, M, Bos, H & Giuffrida, C 2022, Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. in Proceedings of the 31st USENIX Security Symposium. USENIX Association, pp. 971-988, 31st USENIX Security Symposium, Boston, Massachusetts, United States, 10/08/22. <https://www.usenix.org/conference/usenixsecurity22/presentation/barberis>
Hernandez, G, Muench, M, Maier, D, Milburn, A, Park, S, Scharnowski, T, Tucker, T, Traynor, P & Butler, KRB 2022, FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. in NDSS Symposium 2022 Accepted Papers., 136, The Internet Society, pp. 1-19, Network and Distributed Systems Security (NDSS) Symposium 2022, San Diego, California, United States, 24/04/22. https://doi.org/10.14722/ndss.2022.23136
Scharnowski, T, Bars, N, Schloegel, M, Gustafson, E, Muench, M, Vigna, G, Kruegel, C, Holz, T & Abbasi, A 2022, Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. in Proceedings of the 31st USENIX Security Symposium. USENIX Association, pp. 1239-1256, 31st USENIX Security Symposium, Boston, Massachusetts, United States, 10/08/22. <https://www.usenix.org/conference/usenixsecurity22/presentation/scharnowski>
Fasano, A, Ballo, T, Muench, M, Leek, T, Bulekov, A, Dolan-Gavitt, B, Egele, M, Francillon, A, Lu, L, Gregory, N, Balzarotti, D & Robertson, W 2021, SoK: Enabling Security Analyses of Embedded Systems via Rehosting. in ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. ASIA CCS: ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), New York, pp. 687–701, ASIA CCS '21, Hong Kong, China, 7/06/21. https://doi.org/10.1145/3433210.3453093
Gustafson, E, Muench, M, Spensky, C, Redini, N, Machiry, A, Fratantonio, Y, Balzarotti, D, Francillon, A, Choe, YR, Kruegel, C & Vigna, G 2019, Toward the Analysis of Embedded Firmware through Automated Re-hosting. in 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, pp. 135-150. <https://www.usenix.org/conference/raid2019/presentation/gustafson>
Muench, M, Nisi, D, Francillon, A & Balzarotti, D 2018, Avatar²: A Multi-target Orchestration Platform. in Workshop on Binary Analysis Research (BAR). BAR 18. https://doi.org/10.14722/bar.2018.23017
Camurati, G, Poeplau, S, Muench, M, Hayes, T & Francillon, A 2018, Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. in Proceedings of the 25th ACM conference on Computer and communications security (CCS). CCS '18, ACM/IEEE. https://doi.org/10.1145/3243734.3243802
Muench, M, Stijohann, J, Kargl, F, Francillon, A & Balzarotti, D 2018, What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. in Network and Distributed System Security (NDSS) Symposium. NDSS 18. https://doi.org/10.14722/ndss.2018.23166
Muench, M, Pagani, F, Shoshitaishvili, Y, Kruegel, C, Vigna, G & Balzarotti, D 2016, Taming transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. in Research in Attacks, Intrusions, and Defenses (RAID). pp. 24-48. <https://www.s3.eurecom.fr/docs/raid16_muench.pdf>
View all publications in research portal