Name
Affiliation
Papers
HERBERT BOS
Vrije Universiteit Amsterdam, Amsterdam, The Netherlands
161
Collaborators
Citations 
PageRank 
207
2127
122.81
Referers 
Referees 
References 
4072
3551
2699
Search Limit
1001000
Title
Citations
PageRank
Year
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access00.342022
On the effectiveness of same-domain memory deduplication00.342022
DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels00.342022
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection00.342021
LeanSym - Efficient Hybrid Fuzzing Through Conservative Constraint Debloating.00.342021
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript00.342021
PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination00.342021
CrossTalk - Speculative Data Leaks Across Cores Are Real.00.342021
Benchmarking Flaws Undermine Security Research.00.342020
PANDAcap: a framework for streamlining collection of full-system traces00.342020
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions00.342020
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs00.342020
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures20.352020
NetCAT: Practical Cache Attacks from the Network30.392020
Cupid - Automatic Fuzzer Selection for Collaborative Fuzzing.00.342020
Speculative Probing: Hacking Blind in the Spectre Era30.382020
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks210.652019
Malicious cryptocurrency miners: Status and Outlook.00.342019
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations10.352019
RIDL: Rogue In-Flight Data Load220.822019
SoK: Benchmarking Flaws in Systems Security10.352019
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution60.432019
Delta pointers: buffer overflow checks without the checks.50.432018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure10.342018
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.140.912018
Benchmarking Crimes: An Emerging Threat in Systems Security.40.442018
On the Effectiveness of Code Normalization for Function Identification10.362018
Off-the-shelf Embedded Devices as Platforms for Security Research.20.472017
No Need to Hide: Protecting Safe Regions on Commodity Hardware.110.532017
Compiler-Agnostic Function Detection in Binaries80.502017
MARX: Uncovering Class Hierarchies in C++ Programs.60.422017
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.140.542017
ASLR on the Line: Practical Cache Attacks on the MMU.210.692017
Fast and Generic Metadata Management with Mid-Fat Pointers.10.352017
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.20.362017
Poking Holes In Information Hiding160.552016
On the detection of custom memory allocators in C binaries10.352016
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector651.772016
POSTER: Identifying Dynamic Data Structures in Malware.20.372016
Scalable data structure detection and classification for C/C++ binaries10.372016
Trade-Offs in Automatic Provenance Capture.40.422016
A NEaT Design for Reliable and Scalable Network Stacks.00.342016
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems20.462016
Software that Meets Its Intent.10.362016
An In-Depth Analysis Of Disassembly On Full-Scale X86/X64 Binaries130.532016
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level350.832016
Flip Feng Shui: Hammering A Needle In The Software Stack230.792016
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging00.342016
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.00.342016
“Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them10.402015
  • 1
  • 2