Mathias Payer

Source: Wikipedia, the free encyclopedia.
Professor
Mathias Payer
Born1981 (age 42–43)
Citizenship
Software security
Systems security
InstitutionsÉcole Polytechnique Fédérale de Lausanne (EPFL)
Main interestsSystem security
Software security
Mitigation
Sanitization
Test automation
Websitehttps://hexhive.epfl.ch/

Mathias Payer (born 1981) is a Liechtensteinian computer scientist.[1] His research is invested in software and system security. He is Associate Professor at the École Polytechnique Fédérale de Lausanne (EPFL) and head of the HexHive research group .[2]

Career

Mathias Payer studied computer science at ETH Zurich and received his master's degree in 2006. He then joined the Laboratory for Software Technology of Thomas R. Gross at ETH Zurich as a PhD student and graduated with a thesis on secure execution in 2012, focusing on techniques to mitigate control-flow hijacking attacks.[3] In 2010, he was working at Google as software security engineer in the anti-malware and anti-phishing team, where he was dedicated detecting novel malware. In 2012, he joined Dawn Song's BitBlaze group at University of California, Berkeley as a postdoctoral scholar working on the analysis and classification of memory errors.[4] In 2014, he received an appointment as Assistant Professor from Purdue University, where he founded his research laboratory, the HexHive Group.[5] In 2018 he moved to EPFL as an assistant professor in Computer Science [2] and received tenure in 2021. [6] The HexHive Group is now located on the Lausanne Campus of EPFL.[7]

Research

Payer's research centers on software and systems security. He develops and refines tools that enable software developers to discover and patch software bugs, and thereby rendering their programs for resilient to potential software exploits. To reach this goal Payer employs two strategies.

sanitization techniques that point to security issues of factors such as memory, type safety and API flow safety, and thereby enabling more salient products.[8][9][10] The second are fuzzing techniques that create a set of input data for programs by combining static and dynamic analysis. The novel input data set extend and complement the set of existing test vectors. Using this newly created input data helps to uncover exploitable vulnerabilities, such as control-flow integrity making use of specific language semantics, requiring type integrity, and safeguarding selective data.[11][12][13][14]

Payer's research has led to the discovery of several software vulnerabilities. Among them are the Bluetooth bugs BLURtooth[15] and BLESA,[16] and USBFuzz, a vulnerability that affects the implementation of USB protocol parsing across major operating systems.[17][18][19]

Payer has been contributing to the development of the Decentralized Privacy-Preserving Proximity (DP-3T) protocol, on which the SwissCovid mobile application is built. The app allows for anonymous contact tracing to mitigate the COVID-19 pandemic.[20][21][22][23][24][25]

Payer assisted the creation of the startup company xorlab that a former student of his, Antonio Barresi, founded.[26][27]

He gained recognition beyond his research field through his lectures at the CCC - Chaos Communication Congress,[28][29][30] the BHEU-Black Hat Europe,[31] and others.[32][33]

Distinctions

He received the SNSF Eccellenza Award,[34] and gained an ERC Starting Grant.[35] He is a Distinguished Member of the ACM "for contributions to protecting systems in the presence of vulnerabilities".[36]

Selected works

References

  1. ^ "Corona-Warn-App steht in den Startlöchern". Vaterland online. 13 May 2020. Retrieved 2020-09-30.
  2. ^ a b "15 new professors appointed at ETH Zurich and EPFL". www.admin.ch. Retrieved 2021-11-22.
  3. ^ Payer, M.J., 2012. Safe loading and efficient runtime confinement: A foundation for secure execution (Doctoral dissertation, ETH Zurich). PDF
  4. S2CID 2937041
    .
  5. ^ "Purdue University - Department of Computer Science -". www.cs.purdue.edu. Retrieved 2020-09-30.
  6. ^ "15 new professors appointed at ETH Zurich and EPFL – ETH Board". Retrieved 2022-11-30.
  7. ^ a b "HexHive". hexhive.epfl.ch. Retrieved 2020-09-30.
  8. S2CID 3732217
    .
  9. .
  10. , retrieved 2020-09-30
  11. .
  12. .
  13. .
  14. , retrieved 2020-09-30
  15. ^ Lou, Remi (2020-09-11). "BLURtooth : Cette faille de sécurité du Bluetooth n'a pas de solution". Journal du Geek (in French). Retrieved 2020-09-30.
  16. ^ Cimpanu, Catalin. "Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw". ZDNet. Retrieved 2020-09-30.
  17. ^ Cimpanu, Catalin. "New fuzzing tool finds 26 USB bugs in Linux, Windows, macOS, and FreeBSD". ZDNet. Retrieved 2020-09-30.
  18. ^ May 2020, Anthony Spadafora 28 (28 May 2020). "USB systems may have some serious security flaws - especially on Linux". TechRadar. Retrieved 2020-09-30.{{cite web}}: CS1 maint: numeric names: authors list (link)
  19. ^ "New fuzzing tool picks up insecure USB driver code". iTnews. Retrieved 2020-10-07.
  20. ^ "DP-3T White Paper". GitHub. 2020-05-20. Retrieved 2020-09-30.
  21. ^ "Coronavirus: England's contact tracing app trial gets under way". BBC News. 2020-08-13. Retrieved 2020-10-07.
  22. ^ "EPFL researchers put proximity tracing app to the test". Science|Business. Retrieved 2020-09-30.
  23. ^ "Wissenschaftler warnen vor beispielloser Überwachung der Gesellschaft". www.netzwoche.ch (in German). 22 April 2020. Retrieved 2020-09-30.
  24. ^ "Coronavirus und Contact-Tracing – Mit dieser App will die Schweiz aus dem Lockdown". Basler Zeitung (in German). 21 April 2020. Retrieved 2020-10-07.
  25. ^ "Distanzmessung mit Bluetooth – Die "Swiss Covid"-App könnte zu vielen Fehlalarmen führen". Tages-Anzeiger (in German). 20 June 2020. Retrieved 2020-10-07.
  26. ^ "Security Advisory - "Cross-VM ASL INtrospection (CAIN)"". Retrieved 2020-10-07.
  27. ^ "About". www.xorlab.com. Retrieved 2020-10-07.
  28. ^ Nspace; gannimo (29 December 2019), No source, no problem! High speed binary fuzzing, retrieved 2020-10-07
  29. ^ gannimo (30 December 2017), Type confusion: discovery, abuse, and protection, retrieved 2020-10-07
  30. ^ gannimo; [email protected] (28 December 2015), New memory corruption attacks: why can't we have nice things?, retrieved 2020-10-07
  31. ^ "Black Hat Europe 2015". www.blackhat.com. Retrieved 2020-10-07.
  32. ^ "From the Bluetooth Standard to Standard Compliant 0-days | Daniele Antonioli and Mathias Payer | hardwear.io Virtual Conference". hardwear.io. Retrieved 2020-10-07.
  33. ^ "Talks Schedule 2020 | Insomni'Hack". Retrieved 2020-10-07.
  34. ^ "Eccellenza: List of awardees" (PDF). 2019-11-01. Retrieved 2020-09-30.
  35. ^ "ERC FUNDED PROJECTS". ERC: European Research Council. Retrieved 2020-09-30.
  36. ^ "International Computing Society Recognizes 2023 Distinguished Members for Significant Achievements". January 17, 2024.

External links