From post

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (best student paper award)

, , , , , и . IEEE Symposium on Security and Privacy (S&P), (мая 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks., , , и . USENIX Security Symposium, USENIX Association, (2011)Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks., , , , , , и . EuroS&P, стр. 167-182. IEEE, (2018)Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure., , , , , и . ESSoS, том 10379 из Lecture Notes in Computer Science, стр. 143-160. Springer, (2017)Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses., , , , , и . EuroS&P, стр. 366-381. IEEE, (2017)Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire., , , и . NDSS, The Internet Society, (2016)Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP., , , , , и . CCS, стр. 1803-1820. ACM, (2020)CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs., , , и . CODASPY, стр. 337-347. ACM, (2024)The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle., , , , , , и . USENIX Security Symposium, стр. 3505-3522. USENIX Association, (2021)Applicable Micropatches and Where to Find Them: Finding and Applying New Security Hot Fixes to Old Software., , , и . ICST, стр. 394-405. IEEE, (2021)Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks., , , и . IEEE Symposium on Security and Privacy, стр. 3-18. IEEE Computer Society, (2011)