var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dproj_sharcs%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=keywords:type_paper,&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dproj_sharcs%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=keywords:type_paper,\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dproj_sharcs%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=keywords:type_paper,\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2018\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.\n \n \n \n \n\n\n \n Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n In S&P, May 2018. \n Pwnie Award Nomination for Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"GrandPaper\n  \n \n \n \"GrandWeb\n  \n \n \n \"GrandPress\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 145 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{frigo_grand_2018,\n\ttitle = {Grand {Pwning} {Unit}: {Accelerating} {Microarchitectural} {Attacks} with the {GPU}},\n\turl = {Paper=https://download.vusec.net/papers/glitch_sp18.pdf Web=https://www.vusec.net/projects/glitch Press=https://goo.gl/SkD9er},\n\tbooktitle = {S\\&{P}},\n\tauthor = {Frigo, Pietro and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for Most Innovative Research},\n\tkeywords = {class\\_rowhammer, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_award, type\\_conf, type\\_cve\\_assigned, type\\_mscthesis, type\\_paper, type\\_press, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.\n \n \n \n \n\n\n \n van der Veen, V.; Andriesse, D.; Stamatogiannakis, M.; Chen, X.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In CCS, October 2017. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n \n \"TheWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_dynamics_2017,\n\ttitle = {The {Dynamics} of {Innocent} {Flesh} on the {Bone}: {Code} {Reuse} {Ten} {Years} {Later}},\n\turl = {Paper=http://vvdveen.com/publications/newton.pdf Web=https://www.vusec.net/projects/newton},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Andriesse, Dennis and Stamatogiannakis, Manolis and Chen, Xi and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2017},\n\tkeywords = {class\\_binary, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Page Fusion with VUsion.\n \n \n \n \n\n\n \n Oliverio, M.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In SOSP, October 2017. \n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n \n \"SecureSlides\n  \n \n \n \"SecurePoster\n  \n \n \n \"SecureWeb\n  \n \n \n \"SecureCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{oliverio_secure_2017,\n\ttitle = {Secure {Page} {Fusion} with {VUsion}},\n\turl = {Paper=https://download.vusec.net/papers/vusion_sosp17.pdf Slides=https://docs.google.com/presentation/d/1Erf1r9gCtkj-JuCBT7BW93W7YjGiplkO8GHAAT56W9s/edit#slide=id.p3 Poster=https://vusec.net/wp-content/uploads/2017/10/poster.pdf Web=https://www.vusec.net/projects/vusion Code=https://github.com/vusec/vusion},\n\tbooktitle = {{SOSP}},\n\tauthor = {Oliverio, Marco and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2017},\n\tkeywords = {class\\_rowhammer, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Automated Discovery of Crash-Resistant Primitives in Binaries.\n \n \n \n \n\n\n \n Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T.\n\n\n \n\n\n\n In DSN, June 2017. \n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n \n \"TowardsWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kollenda_towards_2017,\n\ttitle = {Towards {Automated} {Discovery} of {Crash}-{Resistant} {Primitives} in {Binaries}},\n\turl = {Paper=https://download.vusec.net/papers/autocrop_dsn17.pdf Web=https://www.vusec.net/projects/nowhere-to-hide},\n\tbooktitle = {{DSN}},\n\tauthor = {Kollenda, Benjamin and Goktas, Enes and Blazytko, Tim and Koppe, Philipp and Gawlik, Robert and Konoth, Radhesh Krishnan and Giuffrida, Cristiano and Bos, Herbert and Holz, Thorsten},\n\tmonth = jun,\n\tyear = {2017},\n\tkeywords = {class\\_ih, class\\_rand, class\\_sidechannels, proj\\_protasis, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Fast and Generic Metadata Management with Mid-Fat Pointers.\n \n \n \n \n\n\n \n Kroes, T.; Koning, K.; Giuffrida, C.; Bos, H.; and van der Kouwe, E.\n\n\n \n\n\n\n In EuroSec, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"FastPaper\n  \n \n \n \"FastCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kroes_fast_2017,\n\ttitle = {Fast and {Generic} {Metadata} {Management} with {Mid}-{Fat} {Pointers}},\n\turl = {Paper=https://download.vusec.net/papers/midfat_eurosec17.pdf Code=https://github.com/vusec/midfat},\n\tbooktitle = {{EuroSec}},\n\tauthor = {Kroes, Taddeus and Koning, Koen and Giuffrida, Cristiano and Bos, Herbert and van der Kouwe, Erik},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {class\\_sanitizer, class\\_testing, proj\\_sharcs, proj\\_vici, type\\_paper, type\\_workshop},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.\n \n \n \n \n\n\n \n van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In EuroSec, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"RevAnC:Paper\n  \n \n \n \"RevAnC:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 139 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_revanc_2017,\n\ttitle = {{RevAnC}: {A} {Framework} for {Reverse} {Engineering} {Hardware} {Page} {Table} {Caches}},\n\turl = {Paper=https://download.vusec.net/papers/revanc_eurosec17.pdf Code=https://github.com/vusec/revanc},\n\tbooktitle = {{EuroSec}},\n\tauthor = {van Schaik, Stephan and Razavi, Kaveh and Gras, Ben and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {class\\_reveng, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_mscthesis, type\\_paper, type\\_workshop},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks.\n \n \n \n \n\n\n \n Chen, X.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In EuroS&P, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"CodeArmor:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{chen_codearmor_2017,\n\ttitle = {{CodeArmor}: {Virtualizing} the {Code} {Space} to {Counter} {Disclosure} {Attacks}},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/codearmor-eurosp-2017.pdf},\n\tbooktitle = {{EuroS}\\&{P}},\n\tauthor = {Chen, Xi and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {class\\_armor, class\\_rand, proj\\_sharcs, type\\_conf, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DangSan: Scalable Use-after-free Detection.\n \n \n \n \n\n\n \n van der Kouwe, E.; Nigade, V.; and Giuffrida, C.\n\n\n \n\n\n\n In EuroSys, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"DangSan:Paper\n  \n \n \n \"DangSan:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_kouwe_dangsan_2017,\n\ttitle = {{DangSan}: {Scalable} {Use}-after-free {Detection}},\n\turl = {Paper=https://download.vusec.net/papers/dangsan_eurosys17.pdf Code=https://github.com/vusec/dangsan},\n\tbooktitle = {{EuroSys}},\n\tauthor = {van der Kouwe, Erik and Nigade, Vinod and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {class\\_sanitizer, class\\_testing, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n No Need to Hide: Protecting Safe Regions on Commodity Hardware.\n \n \n \n \n\n\n \n Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E.\n\n\n \n\n\n\n In EuroSys, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"NoPaper\n  \n \n \n \"NoWeb\n  \n \n \n \"NoCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{koning_no_2017,\n\ttitle = {No {Need} to {Hide}: {Protecting} {Safe} {Regions} on {Commodity} {Hardware}},\n\turl = {Paper=https://download.vusec.net/papers/memsentry_eurosys17.pdf Web=https://www.vusec.net/projects/nowhere-to-hide Code=https://github.com/vusec/memsentry},\n\tbooktitle = {{EuroSys}},\n\tauthor = {Koning, Koen and Chen, Xi and Bos, Herbert and Giuffrida, Cristiano and Athanasopoulos, Elias},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {class\\_ih, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ASLR on the Line: Practical Cache Attacks on the MMU.\n \n \n \n \n\n\n \n Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In NDSS, February 2017. \n Pwnie Award for Most Innovative Research, DCSR Paper Award\n\n\n\n
\n\n\n\n \n \n \"ASLRPaper\n  \n \n \n \"ASLRSlides\n  \n \n \n \"ASLRWeb\n  \n \n \n \"ASLRCode\n  \n \n \n \"ASLRPress\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 260 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_aslr_2017,\n\ttitle = {{ASLR} on the {Line}: {Practical} {Cache} {Attacks} on the {MMU}},\n\turl = {Paper=https://download.vusec.net/papers/anc_ndss17.pdf Slides=https://vusec.net/wp-content/uploads/2016/11/TalkGras.pdf Web=https://www.vusec.net/projects/anc Code=https://github.com/vusec/revanc Press=https://goo.gl/KL4Bta},\n\tbooktitle = {{NDSS}},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bosman, Erik and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tnote = {Pwnie Award for Most Innovative Research, DCSR Paper Award},\n\tkeywords = {class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_award, type\\_conf, type\\_csec, type\\_cve\\_assigned, type\\_paper, type\\_press, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VUzzer: Application-aware Evolutionary Fuzzing.\n \n \n \n \n\n\n \n Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In NDSS, February 2017. \n \n\n\n\n
\n\n\n\n \n \n \"VUzzer:Paper\n  \n \n \n \"VUzzer:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{rawat_vuzzer_2017,\n\ttitle = {{VUzzer}: {Application}-aware {Evolutionary} {Fuzzing}},\n\turl = {Paper=https://download.vusec.net/papers/vuzzer_ndss17.pdf Code=https://github.com/vusec/vuzzer64},\n\tbooktitle = {{NDSS}},\n\tauthor = {Rawat, Sanjay and Jain, Vivek and Kumar, Ashish and Cojocar, Lucian and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = feb,\n\tyear = {2017},\n\tkeywords = {class\\_testing, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.\n \n \n \n \n\n\n \n Milburn, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In NDSS, February 2017. \n \n\n\n\n
\n\n\n\n \n \n \"SafeInit:Paper\n  \n \n \n \"SafeInit:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{milburn_safeinit_2017,\n\ttitle = {{SafeInit}: {Comprehensive} and {Practical} {Mitigation} of {Uninitialized} {Read} {Vulnerabilities}},\n\turl = {Paper=https://download.vusec.net/papers/safeinit_ndss17.pdf Code=https://github.com/vusec/safeinit},\n\tbooktitle = {{NDSS}},\n\tauthor = {Milburn, Alyssa and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tkeywords = {class\\_sanitizer, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_mscthesis, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MARX: Uncovering Class Hierarchies in C++ Programs.\n \n \n \n \n\n\n \n Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C.\n\n\n \n\n\n\n In NDSS, February 2017. \n \n\n\n\n
\n\n\n\n \n \n \"MARX:Paper\n  \n \n \n \"MARX:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{pawlowski_marx_2017,\n\ttitle = {{MARX}: {Uncovering} {Class} {Hierarchies} in {C}++ {Programs}},\n\turl = {Paper=https://download.vusec.net/papers/marx_ndss17.pdf Code=https://github.com/RUB-SysSec/Marx},\n\tbooktitle = {{NDSS}},\n\tauthor = {Pawlowski, Andre and Contag, Moritz and van der Veen, Victor and Ouwehand, Chris and Holz, Thorsten and Bos, Herbert and Athanasopoulos, Elias and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tkeywords = {class\\_armor, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (18)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A NEaT Design for Reliable and Scalable Network Stacks.\n \n \n \n \n\n\n \n Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S.\n\n\n \n\n\n\n In CoNext, December 2016. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hruby_neat_2016,\n\ttitle = {A {NEaT} {Design} for {Reliable} and {Scalable} {Network} {Stacks}},\n\turl = {https://download.vusec.net/papers/neat_conext16.pdf},\n\tbooktitle = {{CoNext}},\n\tauthor = {Hruby, Tomas and Giuffrida, Cristiano and Sambuc, Lionel and Bos, Herbert and Tanenbaum, Andrew S.},\n\tmonth = dec,\n\tyear = {2016},\n\tkeywords = {class\\_network, class\\_reliability, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VTPin: Practical VTable Hijacking Protection for Binaries.\n \n \n \n \n\n\n \n Sarbinowski, P.; Kemerlis, V. P.; Giuffrida, C.; and Athanasopoulos, E.\n\n\n \n\n\n\n In ACSAC, December 2016. \n \n\n\n\n
\n\n\n\n \n \n \"VTPin:Paper\n  \n \n \n \"VTPin:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{sarbinowski_vtpin_2016,\n\ttitle = {{VTPin}: {Practical} {VTable} {Hijacking} {Protection} for {Binaries}},\n\turl = {Paper=https://download.vusec.net/papers/vtpin_acsac16.pdf Code=https://github.com/uberspot/VTPin},\n\tbooktitle = {{ACSAC}},\n\tauthor = {Sarbinowski, Pawel and Kemerlis, Vasileios P. and Giuffrida, Cristiano and Athanasopoulos, Elias},\n\tmonth = dec,\n\tyear = {2016},\n\tkeywords = {class\\_armor, proj\\_sharcs, type\\_conf, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Bypassing Clang's SafeStack for Fun and Profit.\n \n \n \n \n\n\n \n Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In Black Hat Europe, November 2016. \n \n\n\n\n
\n\n\n\n \n \n \"BypassingSlides\n  \n \n \n \"BypassingWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{goktas_bypassing_2016,\n\ttitle = {Bypassing {Clang}'s {SafeStack} for {Fun} and {Profit}},\n\turl = {Slides=https://download.vusec.net/papers/safestack-bypass_bheu16.pdf Web=https://www.vusec.net/projects/nowhere-to-hide},\n\tbooktitle = {Black {Hat} {Europe}},\n\tauthor = {Goktas, Enes and Oikonomopoulos, Angelos and Gawlik, Robert and Kollenda, Benjamin and Athanasopoulos, Elias and Portokalidis, Georgios and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2016},\n\tkeywords = {class\\_ih, class\\_rand, class\\_sidechannels, proj\\_sharcs, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Rowhammering the VM's Isolation.\n \n \n \n \n\n\n \n Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In Black Hat Europe, November 2016. \n \n\n\n\n
\n\n\n\n \n \n \"FlipSlides\n  \n \n \n \"FlipWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 65 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016,\n\ttitle = {Flip {Feng} {Shui}: {Rowhammering} the {VM}'s {Isolation}},\n\turl = {Slides=https://download.vusec.net/papers/flip-feng-shui_bheu16.pdf Web=https://www.vusec.net/projects/flip-feng-shui},\n\tbooktitle = {Black {Hat} {Europe}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2016},\n\tkeywords = {class\\_rowhammer, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.\n \n \n \n \n\n\n \n van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C.\n\n\n \n\n\n\n In CCS, October 2016. \n Pwnie Award for Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSR Paper Award\n\n\n\n
\n\n\n\n \n \n \"Drammer:Paper\n  \n \n \n \"Drammer:Web\n  \n \n \n \"Drammer:Code\n  \n \n \n \"Drammer:Press\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 222 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_drammer_2016,\n\ttitle = {Drammer: {Deterministic} {Rowhammer} {Attacks} on {Mobile} {Platforms}},\n\turl = {Paper=https://vvdveen.com/publications/drammer.pdf Web=https://www.vusec.net/projects/drammer Code=https://github.com/vusec/drammer Press=https://goo.gl/y0lZ3l},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clementine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tnote = {Pwnie Award for Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSR Paper Award},\n\tkeywords = {class\\_mobile, class\\_rowhammer, proj\\_sharcs, type\\_award, type\\_bounty, type\\_conf, type\\_cve\\_assigned, type\\_paper, type\\_press, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TypeSan: Practical Type Confusion Detection.\n \n \n \n \n\n\n \n Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E.\n\n\n \n\n\n\n In CCS, October 2016. \n \n\n\n\n
\n\n\n\n \n \n \"TypeSan:Paper\n  \n \n \n \"TypeSan:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 14 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{haller_typesan_2016,\n\ttitle = {{TypeSan}: {Practical} {Type} {Confusion} {Detection}},\n\turl = {Paper=https://download.vusec.net/papers/typesan_ccs16.pdf Code=https://github.com/vusec/typesan},\n\tbooktitle = {{CCS}},\n\tauthor = {Haller, Istvan and Yuseok, Jeon and Peng, Hui and Payer, Mathias and Giuffrida, Cristiano and Bos, Herbert and van der Kouwe, Erik},\n\tmonth = oct,\n\tyear = {2016},\n\tkeywords = {class\\_sanitizer, class\\_testing, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging.\n \n \n \n \n\n\n \n Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C.\n\n\n \n\n\n\n In ISSRE, October 2016. \n \n\n\n\n
\n\n\n\n \n \n \"PeekingPaper\n  \n \n \n \"PeekingCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{miraglia_peeking_2016,\n\ttitle = {Peeking into the {Past}: {Efficient} {Checkpoint}-assisted {Time}-traveling {Debugging}},\n\turl = {Paper=https://download.vusec.net/papers/delorean_issre16.pdf Code=https://github.com/vusec/delorean},\n\tbooktitle = {{ISSRE}},\n\tauthor = {Miraglia, Armando and Vogt, Dirk and Bos, Herbert and Tanenbaum, Andrew S. and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tkeywords = {class\\_reliability, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_mscthesis, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Undermining Information Hiding (And What to do About it).\n \n \n \n \n\n\n \n Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"UnderminingPaper\n  \n \n \n \"UnderminingWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{goktas_undermining_2016,\n\ttitle = {Undermining {Information} {Hiding} ({And} {What} to do {About} it)},\n\turl = {Paper=https://download.vusec.net/papers/thread-spraying_sec16.pdf Web=https://www.vusec.net/projects/nowhere-to-hide},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Goktas, Enes and Gawlik, Robert and Kollenda, Benjamin and Athanasopoulos, Elias and Portokalidis, Georgios and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tkeywords = {class\\_ih, class\\_rand, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.\n \n \n \n \n\n\n \n Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n \n \"AnWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{andriesse_-depth_2016,\n\ttitle = {An {In}-{Depth} {Analysis} of {Disassembly} on {Full}-{Scale} x86/x64 {Binaries}},\n\turl = {Paper=https://syssec.mistakenot.net/papers/sec-2016.pdf Web=https://www.vusec.net/projects/disassembly},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Andriesse, Dennis and Chen, Xi and van der Veen, Victor and Slowinska, Asia and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tkeywords = {class\\_binary, disassembly, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Hammering a Needle in the Software Stack.\n \n \n \n \n\n\n \n Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n Pwnie Award Nomination for Best Cryptographic Attack\n\n\n\n
\n\n\n\n \n \n \"FlipPaper\n  \n \n \n \"FlipSlides\n  \n \n \n \"FlipWeb\n  \n \n \n \"FlipPress\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 120 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016-1,\n\ttitle = {Flip {Feng} {Shui}: {Hammering} a {Needle} in the {Software} {Stack}},\n\turl = {Paper=https://download.vusec.net/papers/flip-feng-shui_sec16.pdf Slides=https://vusec.net/wp-content/uploads/2016/06/presentation.pdf Web=https://www.vusec.net/projects/flip-feng-shui Press=https://goo.gl/owOb2m},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tnote = {Pwnie Award Nomination for Best Cryptographic Attack},\n\tkeywords = {class\\_rowhammer, proj\\_sharcs, type\\_award, type\\_conf, type\\_csec, type\\_paper, type\\_press, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Poking Holes in Information Hiding.\n \n \n \n \n\n\n \n Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n \n\n\n\n
\n\n\n\n \n \n \"PokingPaper\n  \n \n \n \"PokingSlides\n  \n \n \n \"PokingWeb\n  \n \n \n \"PokingCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{oikonomopoulos_poking_2016,\n\ttitle = {Poking {Holes} in {Information} {Hiding}},\n\turl = {Paper=https://download.vusec.net/papers/allocation-oracles_sec16.pdf Slides=https://www.usenix.org/sites/default/files/conference/protected-files/security16_slides_oikonomopoulos.pdf Web=https://www.vusec.net/projects/nowhere-to-hide Code=https://github.com/vusec/poking-holes},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Oikonomopoulos, Angelos and Athanasopoulos, Elias and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = aug,\n\tyear = {2016},\n\tkeywords = {class\\_ih, class\\_rand, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Over the Edge: Silently Owning Windows 10's Secure Browser.\n \n \n \n \n\n\n \n Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In Black Hat USA, July 2016. \n \n\n\n\n
\n\n\n\n \n \n \"OverSlides\n  \n \n \n \"OverWeb\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 42 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_over_2016,\n\ttitle = {Over the {Edge}: {Silently} {Owning} {Windows} 10's {Secure} {Browser}},\n\turl = {Slides=https://download.vusec.net/papers/over-the-edge_bhusa16.pdf Web=https://vusec.net/projects/dedup-est-machina},\n\tbooktitle = {Black {Hat} {USA}},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jul,\n\tyear = {2016},\n\tkeywords = {class\\_rowhammer, class\\_sidechannels, proj\\_sharcs, type\\_conf, type\\_csec, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems.\n \n \n \n \n\n\n \n Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In DSN, June 2016. \n Best Paper Session\n\n\n\n
\n\n\n\n \n \n \"OSIRIS:Paper\n  \n \n \n \"OSIRIS:Code\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bhat_osiris_2016,\n\ttitle = {{OSIRIS}: {Efficient} and {Consistent} {Recovery} of {Compartmentalized} {Operating} {Systems}},\n\turl = {Paper=http://www.cs.vu.nl/~giuffrida/papers/dsn-2016-2.pdf Code=https://github.com/vusec/osiris},\n\tbooktitle = {{DSN}},\n\tauthor = {Bhat, Koustubha and Vogt, Dirk and van der Kouwe, Erik and Gras, Ben and Sambuc, Lionel and Tanenbaum, Andrew S. and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2016},\n\tnote = {Best Paper Session},\n\tkeywords = {class\\_reliability, proj\\_sharcs, type\\_award, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization.\n \n \n \n \n\n\n \n Koning, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In DSN, June 2016. \n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n \n \"SecureCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{koning_secure_2016,\n\ttitle = {Secure and {Efficient} {Multi}-variant {Execution} {Using} {Hardware}-assisted {Process} {Virtualization}},\n\turl = {Paper=http://www.cs.vu.nl/~giuffrida/papers/dsn-2016.pdf Code=https://github.com/vusec/mvarmor},\n\tbooktitle = {{DSN}},\n\tauthor = {Koning, Koen and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2016},\n\tkeywords = {class\\_armor, proj\\_sharcs, type\\_conf, type\\_mscthesis, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.\n \n \n \n \n\n\n \n Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In S&P, May 2016. \n Pwnie Award for Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"DedupPaper\n  \n \n \n \"DedupWeb\n  \n \n \n \"DedupPress\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 94 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_dedup_2016,\n\ttitle = {Dedup {Est} {Machina}: {Memory} {Deduplication} as an {Advanced} {Exploitation} {Vector}},\n\turl = {Paper=https://download.vusec.net/papers/dedup-est-machina_sp16.pdf Web=https://www.vusec.net/projects/dedup-est-machina Press=https://goo.gl/ogBXTm},\n\tbooktitle = {S\\&{P}},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tnote = {Pwnie Award for Most Innovative Research},\n\tkeywords = {class\\_rowhammer, class\\_sidechannels, proj\\_sharcs, proj\\_vici, type\\_award, type\\_conf, type\\_csec, type\\_cve\\_assigned, type\\_paper, type\\_press, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.\n \n \n \n \n\n\n \n van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C.\n\n\n \n\n\n\n In S&P, May 2016. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n \n \"ACode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_tough_2016,\n\ttitle = {A {Tough} {Call}: {Mitigating} {Advanced} {Code}-{Reuse} {Attacks} at the {Binary} {Level}},\n\turl = {Paper=https://download.vusec.net/papers/typearmor_sp16.pdf Code=https://github.com/vusec/typearmor},\n\tbooktitle = {S\\&{P}},\n\tauthor = {van der Veen, Victor and Goktas, Enes and Contag, Moritz and Pawlowski, Andre and Chen, Xi and Rawat, Sanjay and Bos, Herbert and Holz, Thorsten and Athanasopoulos, Elias and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tkeywords = {class\\_armor, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening.\n \n \n \n \n\n\n \n Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n In EuroSec, April 2016. \n \n\n\n\n
\n\n\n\n \n \n \"METAlloc:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{haller_metalloc_2016,\n\ttitle = {{METAlloc}: {Efficient} and {Comprehensive} {Metadata} {Management} for {Software} {Security} {Hardening}},\n\tshorttitle = {{METAlloc}},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/eurosec-2016.pdf},\n\tbooktitle = {{EuroSec}},\n\tauthor = {Haller, Istvan and van der Kouwe, Erik and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = apr,\n\tyear = {2016},\n\tkeywords = {class\\_sanitizer, class\\_testing, proj\\_sharcs, type\\_csec, type\\_paper, type\\_workshop},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Binary Rejuvenation: Applications and Challenges.\n \n \n \n \n\n\n \n Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H.\n\n\n \n\n\n\n IEEE S&P Magazine, 14(1). January 2016.\n \n\n\n\n
\n\n\n\n \n \n \"BinaryPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{oikonomopoulos_binary_2016,\n\ttitle = {Binary {Rejuvenation}: {Applications} and {Challenges}},\n\tvolume = {14},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/spmag-2016.pdf},\n\tnumber = {1},\n\tjournal = {IEEE S\\&P Magazine},\n\tauthor = {Oikonomopoulos, Angelos and Giuffrida, Cristiano and Rawat, Sanjay and Bos, Herbert},\n\tmonth = jan,\n\tyear = {2016},\n\tkeywords = {class\\_reveng, proj\\_sharcs, type\\_mag, type\\_paper},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Practical Context-Sensitive CFI.\n \n \n \n \n\n\n \n van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In CCS, November 2015. \n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n \n \"PracticalWeb\n  \n \n \n \"PracticalCode\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 101 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_practical_2015,\n\ttitle = {Practical {Context}-{Sensitive} {CFI}},\n\turl = {Paper=http://www.cs.vu.nl/~giuffrida/papers/ccs-2015.pdf Web=https://www.vusec.net/projects/patharmor Code=https://github.com/vusec/patharmor},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Andriesse, Dennis and Göktas, Enes and Gras, Ben and Sambuc, Lionel and Slowinska, Asia and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = nov,\n\tyear = {2015},\n\tkeywords = {class\\_armor, proj\\_sharcs, proj\\_vici, type\\_conf, type\\_csec, type\\_paper, type\\_tier1, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ShrinkWrap: VTable Protection Without Loose Ends.\n \n \n \n \n\n\n \n Haller, I.; Goktas, E.; Athanasopoulos, E.; Portokalidis, G.; and Bos, H.\n\n\n \n\n\n\n In ACSAC, October 2015. \n Outstanding Student Paper Award\n\n\n\n
\n\n\n\n \n \n \"ShrinkWrap:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{haller_shrinkwrap_2015,\n\ttitle = {{ShrinkWrap}: {VTable} {Protection} {Without} {Loose} {Ends}},\n\turl = {http://www.cs.vu.nl/%7Eherbertb/papers/shrinkwrap_acsac15.pdf},\n\tbooktitle = {{ACSAC}},\n\tauthor = {Haller, Istvan and Goktas, Enes and Athanasopoulos, Elias and Portokalidis, Georgios and Bos, Herbert},\n\tmonth = oct,\n\tyear = {2015},\n\tnote = {Outstanding Student Paper Award},\n\tkeywords = {class\\_armor, proj\\_sharcs, proj\\_vici, type\\_award, type\\_conf, type\\_csec, type\\_paper, type\\_top},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Speculative Memory Checkpointing.\n \n \n \n \n\n\n \n Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n In Middleware, October 2015. \n \n\n\n\n
\n\n\n\n \n \n \"SpeculativePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{vogt_speculative_2015,\n\ttitle = {Speculative {Memory} {Checkpointing}},\n\turl = {http://www.cs.vu.nl/~giuffrida/papers/middleware-2015.pdf},\n\tbooktitle = {Middleware},\n\tauthor = {Vogt, Dirk and Miraglia, Armando and Portokalidis, Georgios and Tanenbaum, Andrew S. and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2015},\n\tkeywords = {class\\_reliability, proj\\_sharcs, type\\_conf, type\\_csec, type\\_paper, type\\_top},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);