Payer's research centers on software and systems security. He develops and refines tools that enable software developers to discover and patch software bugs, and thereby rendering their programs for resilient to potential software exploits. To reach this goal Payer employs two strategies. The second are
fuzzing techniques that create a set of input data for programs by combining static and dynamic analysis. The novel input data set extend and complement the set of existing test vectors. Using this newly created input data helps to uncover exploitable vulnerabilities, such as control-flow integrity making use of specific language semantics, requiring type integrity, and safeguarding selective data. Payer's research has led to the discovery of several software vulnerabilities. Among them are the
Bluetooth bugs BLURtooth and BLESA, and USBFuzz, a vulnerability that affects the implementation of
USB protocol parsing across major operating systems. Payer has been contributing to the development of the
Decentralized Privacy-Preserving Proximity (DP-3T) protocol, on which the
SwissCovid mobile application is built. The app allows for anonymous contact tracing to mitigate the
COVID-19 pandemic. Payer assisted the creation of the startup company xorlab that a former student of his, Antonio Barresi, founded. He gained recognition beyond his research field through his lectures at the
CCC - Chaos Communication Congress, the BHEU-Black Hat Europe, and others. == Distinctions ==