DangZero: Efficient Use-After-Free Detection via Direct Page Table Access | 0 | 0.34 | 2022 |
On the effectiveness of same-domain memory deduplication | 0 | 0.34 | 2022 |
DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels | 0 | 0.34 | 2022 |
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection | 0 | 0.34 | 2021 |
LeanSym - Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. | 0 | 0.34 | 2021 |
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript | 0 | 0.34 | 2021 |
PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination | 0 | 0.34 | 2021 |
CrossTalk - Speculative Data Leaks Across Cores Are Real. | 0 | 0.34 | 2021 |
Benchmarking Flaws Undermine Security Research. | 0 | 0.34 | 2020 |
PANDAcap: a framework for streamlining collection of full-system traces | 0 | 0.34 | 2020 |
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions | 0 | 0.34 | 2020 |
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs | 0 | 0.34 | 2020 |
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures | 2 | 0.35 | 2020 |
NetCAT: Practical Cache Attacks from the Network | 3 | 0.39 | 2020 |
Cupid - Automatic Fuzzer Selection for Collaborative Fuzzing. | 0 | 0.34 | 2020 |
Speculative Probing: Hacking Blind in the Spectre Era | 3 | 0.38 | 2020 |
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks | 21 | 0.65 | 2019 |
Malicious cryptocurrency miners: Status and Outlook. | 0 | 0.34 | 2019 |
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations | 1 | 0.35 | 2019 |
RIDL: Rogue In-Flight Data Load | 22 | 0.82 | 2019 |
SoK: Benchmarking Flaws in Systems Security | 1 | 0.35 | 2019 |
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution | 6 | 0.43 | 2019 |
Delta pointers: buffer overflow checks without the checks. | 5 | 0.43 | 2018 |
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure | 1 | 0.34 | 2018 |
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. | 14 | 0.91 | 2018 |
Benchmarking Crimes: An Emerging Threat in Systems Security. | 4 | 0.44 | 2018 |
On the Effectiveness of Code Normalization for Function Identification | 1 | 0.36 | 2018 |
Off-the-shelf Embedded Devices as Platforms for Security Research. | 2 | 0.47 | 2017 |
No Need to Hide: Protecting Safe Regions on Commodity Hardware. | 11 | 0.53 | 2017 |
Compiler-Agnostic Function Detection in Binaries | 8 | 0.50 | 2017 |
MARX: Uncovering Class Hierarchies in C++ Programs. | 6 | 0.42 | 2017 |
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. | 14 | 0.54 | 2017 |
ASLR on the Line: Practical Cache Attacks on the MMU. | 21 | 0.69 | 2017 |
Fast and Generic Metadata Management with Mid-Fat Pointers. | 1 | 0.35 | 2017 |
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. | 2 | 0.36 | 2017 |
Poking Holes In Information Hiding | 16 | 0.55 | 2016 |
On the detection of custom memory allocators in C binaries | 1 | 0.35 | 2016 |
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector | 65 | 1.77 | 2016 |
POSTER: Identifying Dynamic Data Structures in Malware. | 2 | 0.37 | 2016 |
Scalable data structure detection and classification for C/C++ binaries | 1 | 0.37 | 2016 |
Trade-Offs in Automatic Provenance Capture. | 4 | 0.42 | 2016 |
A NEaT Design for Reliable and Scalable Network Stacks. | 0 | 0.34 | 2016 |
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems | 2 | 0.46 | 2016 |
Software that Meets Its Intent. | 1 | 0.36 | 2016 |
An In-Depth Analysis Of Disassembly On Full-Scale X86/X64 Binaries | 13 | 0.53 | 2016 |
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level | 35 | 0.83 | 2016 |
Flip Feng Shui: Hammering A Needle In The Software Stack | 23 | 0.79 | 2016 |
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging | 0 | 0.34 | 2016 |
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. | 0 | 0.34 | 2016 |
“Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them | 1 | 0.40 | 2015 |