\n \n \n
\n
\n \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.\n \n \n \n \n\n\n \n Bacs, A.; Musaev, S.; Razavi, K.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In
FAST, February 2022. \n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 127 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bacs_dupefs_2022,\n\ttitle = {{DupeFS}: {Leaking} {Data} {Over} the {Network} {With} {Filesystem} {Deduplication} {Side} {Channels}},\n\turl = {Paper=https://download.vusec.net/papers/dupefs_fast22.pdf},\n\tbooktitle = {{FAST}},\n\tauthor = {Bacs, Andrei and Musaev, Saidgani and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = feb,\n\tyear = {2022},\n\tkeywords = {class\\_sidechannels, proj\\_intersect, proj\\_offcore, proj\\_unicore, type\\_conf, type\\_mscthesis, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Slick: An Intrusion Detection System for Virtualized Storage Devices.\n \n \n \n \n\n\n \n Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H.\n\n\n \n\n\n\n In
SAC, April 2016. \n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bacs_slick_2016,\n\ttitle = {Slick: {An} {Intrusion} {Detection} {System} for {Virtualized} {Storage} {Devices}},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/sac-2016.pdf},\n\tbooktitle = {{SAC}},\n\tauthor = {Bacs, Andrei and Giuffrida, Cristiano and Grill, Bernhard and Bos, Herbert},\n\tmonth = apr,\n\tyear = {2016},\n\tkeywords = {class\\_malware, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.\n \n \n \n \n\n\n \n Grill, B.; Bacs, A.; Platzer, C.; and Bos, H.\n\n\n \n\n\n\n In
DIMVA, September 2015. \n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{grill_nice_2015,\n\ttitle = {Nice {Boots} - {A} {Large}-{Scale} {Analysis} of {Bootkits} and {New} {Ways} to {Stop} {Them}},\n\turl = {http://www.cs.vu.nl/%7Eherbertb/papers/bootkits_dimva2015.pdf},\n\tbooktitle = {{DIMVA}},\n\tauthor = {Grill, Bernhard and Bacs, Andrei and Platzer, Christian and Bos, Herbert},\n\tmonth = sep,\n\tyear = {2015},\n\tkeywords = {class\\_malware, proj\\_vici, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).\n \n \n \n \n\n\n \n Slowinska, A.; Haller, I.; Bacs, A.; Baranga, S.; and Bos, H.\n\n\n \n\n\n\n In
DIMVA, September 2014. \n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{slowinska_data_2014,\n\ttitle = {Data {Structure} {Archaeology}: {Scrape} {Away} the {Dirt} and {Glue} {Back} the {Pieces}! ({Or}: {Automated} {Techniques} to {Recover} {Split} and {Merged} {Variables})},\n\turl = {http://www.cs.vu.nl/%7Eherbertb/papers/carter_dimva14.pdf},\n\tbooktitle = {{DIMVA}},\n\tauthor = {Slowinska, Asia and Haller, Istvan and Bacs, Andrei and Baranga, Silviu and Bos, Herbert},\n\tmonth = sep,\n\tyear = {2014},\n\tkeywords = {class\\_binary, class\\_reveng, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n System-level Support for Intrusion Recovery.\n \n \n \n \n\n\n \n Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In
DIMVA, September 2012. \n
\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bacs_system-level_2012,\n\ttitle = {System-level {Support} for {Intrusion} {Recovery}},\n\turl = {http://www.few.vu.nl/~herbertb/papers/diskduster_dimva12.pdf},\n\tbooktitle = {{DIMVA}},\n\tauthor = {Bacs, Andrei and Vermeulen, Remco and Slowinska, Asia and Bos, Herbert},\n\tmonth = sep,\n\tyear = {2012},\n\tkeywords = {class\\_malware, type\\_conf, type\\_csec, type\\_mscthesis, type\\_paper},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n