Thorsten Holz (@thorstenholz) 's Twitter Profile
Thorsten Holz

@thorstenholz

Faculty at @CISPA, focussing on computer/systems security. My tweets are my own. Mastodon: @[email protected]

ID: 103634999

calendar_today10-01-2010 18:40:04

5,5K Tweet

6,6K Followers

359 Following

lcamtuf (@lcamtuf) 's Twitter Profile Photo

This is a fantastic meta-paper if you're writing a paper on a novel fuzzing technique: mschloegel.me/paper/schloege


Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Some statistics for USENIX Security : - 417 accepted papers - 53% increase in submissions - 356 PC members wrote more than 6,600 reviews - 24 (!) papers directly accepted, more stats in the picture #usesec24

Some statistics for <a href="/USENIXSecurity/">USENIX Security</a> :
- 417 accepted papers
- 53% increase in submissions 
- 356 PC members wrote more than 6,600 reviews
- 24 (!) papers directly accepted, more stats in the picture 
#usesec24
Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Apparently many not that strong ML security paper submissions, usable security had the highest acceptance rate. Lots of interesting statistics by Davide Balzarotti and Wenyuan Xu regarding USENIX Security, I hope the slides will be available #usesec24

Apparently many not that strong ML security paper submissions, usable security had the highest acceptance rate. Lots of interesting statistics by <a href="/balzarot/">Davide Balzarotti</a> and Wenyuan Xu regarding <a href="/USENIXSecurity/">USENIX Security</a>, I hope the slides will be available #usesec24
Dongdong She (@dongdongshe) 's Twitter Profile Photo

What happens if you write buggy code and misconfigure the experimental setup when evaluating a fuzzer’s performance? Wrong and misleading conclusion! We found several fatal bugs and wrong experimental settings in MLFuzz (arxiv.org/pdf/2309.16618, a revisit work on NEUZZ published

What happens if you write buggy code and misconfigure the experimental setup when evaluating a fuzzer’s performance? Wrong and misleading conclusion!

We found several fatal bugs and wrong experimental settings in MLFuzz (arxiv.org/pdf/2309.16618, a revisit work on NEUZZ published
tylerni7 (@tylerni7) 's Twitter Profile Photo

Some challenges and infra code for AIxCC were released today, with more challenges scheduled for Monday! github.com/aixcc-public Assuming all the challenges we solved are released, we'll publish the POVs and patches our CRS made as well :)

Irina Nicolae (@ririnicolae) 's Twitter Profile Photo

Recently, Dongdong She et al. raised issues regarding our paper “Revisiting Neural Program Smoothing for Fuzzing”. Tldr: they highlight two bugs in our code, make inaccurate statements, and ignore all the core issues we raised đŸ§”: 1/

Dongdong She (@dongdongshe) 's Twitter Profile Photo

Ep5. Rebuttal MLFuzz Thanks Irina’s response. We never heard back from you and Andreas Zeller since last month when we sent the last email to ask if you guys were willing to write an errata of MLFuzz to acknowledge the bugs and wrong conclusion. So I am happy to communicate

Ep5. Rebuttal MLFuzz

Thanks Irina’s response. We never heard back from you and <a href="/AndreasZeller/">Andreas Zeller</a>  since last month when we sent the last email to ask if you guys were willing to write an errata of MLFuzz to acknowledge the bugs and wrong conclusion. So I am happy to communicate
Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Reading tipp for the day: "Collusion Rings Threaten the Integrity of Computer Science Research" by Littman - cacm.acm.org/opinion/collus


Javier Rando @ ICLR (@javirandor) 's Twitter Profile Photo

Jailbreaks have become a new sort of ImageNet competition instead of helping us better understand LLM security. I wrote a blogpost about what I think valuable research could look like đŸ§”

Hossein Hajipour (@ho_hajipour) 's Twitter Profile Photo

8/8 🔗 The paper is available at: arxiv.org/abs/2409.06446. Our code, fine-tuned models, and synthesized data will be available soon for the community to explore at: github.com/hexacoder-ai/h
. Special thanks to all of my collaborators: Lea Schönherr, Thorsten Holz, and Mario Fritz