SoK: Automated software diversity P Larsen, A Homescu, S Brunthaler, M Franz 2014 IEEE Symposium on Security and Privacy, 276-291, 2014 | 485 | 2014 |
Control-flow integrity: Precision, security, and performance N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017 | 375 | 2017 |
Readactor: Practical code randomization resilient to memory disclosure S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... 2015 IEEE Symposium on Security and Privacy, 763-780, 2015 | 330 | 2015 |
Opaque Control-Flow Integrity. V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz NDSS 26, 27-30, 2015 | 244 | 2015 |
Losing control: On the effectiveness of control-flow integrity under stack attacks M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 215 | 2015 |
Thwarting cache side-channel attacks through dynamic software diversity. S Crane, A Homescu, S Brunthaler, P Larsen, M Franz NDSS, 8-11, 2015 | 207 | 2015 |
Profile-guided automated software diversity A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013 | 193 | 2013 |
SoK: Sanitizing for security D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz 2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019 | 177 | 2019 |
It's a TRaP: Table randomization and protection against function-reuse attacks SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 173 | 2015 |
Leakage-Resilient Layout Randomization for Mobile Devices. K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen NDSS 16, 21-24, 2016 | 127 | 2016 |
Librando: transparent code randomization for just-in-time compilers A Homescu, S Brunthaler, P Larsen, M Franz Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013 | 114 | 2013 |
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz WOOT 12, 64-76, 2012 | 96 | 2012 |
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ... NDSS, 2017 | 93 | 2017 |
Secure and efficient application monitoring and replication S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ... 2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016 | 82 | 2016 |
Booby trapping software S Crane, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013 | 80 | 2013 |
Diversifying the software stack using randomized NOP insertion T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz Moving Target Defense II: Application of Game Theory and Adversarial …, 2013 | 70 | 2013 |
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 65 | 2016 |
Security through diversity: Are we there yet? P Larsen, S Brunthaler, M Franz IEEE Security & Privacy 12 (2), 28-35, 2013 | 65 | 2013 |
Selfrando: Securing the tor browser against de-anonymization exploits M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ... Proceedings on Privacy Enhancing Technologies, 2016 | 62 | 2016 |
Large-scale automated software diversity—program evolution redux A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015 | 48 | 2015 |