Drammer: Deterministic Rowhammer Attacks on Mobile Platforms V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ... CCS '16, 2016 | 416 | 2016 |
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ... BADGERS '14, 2014 | 411 | 2014 |
Practical Context-Sensitive CFI V van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ... CCS '15, 2015 | 330 | 2015 |
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level V van der Veen, E Göktaş, M Contag, A Pawlowski, X Chen, S Rawat, ... S&P '16, 2016 | 259 | 2016 |
Memory Errors: The Past, the Present, and the Future V van der Veen, N dutt-Sharma, L Cavallaro, H Bos RAID '12, 2012 | 233 | 2012 |
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries D Andriesse, X Chen, V van der Veen, A Slowinska, H Bos USENIX Sec '16, 2016 | 216 | 2016 |
TRRespass: Exploiting the Many Sides of Target Row Refresh P Frigo, E Vannacci, H Hassan, V van der Veen, O Mutlu, C Giuffrida, ... S&P '20, 2020 | 214 | 2020 |
Andrubis: Android Malware Under the Magnifying Glass L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ... Vienna University of Technology, Technical Report, 2014 | 129 | 2014 |
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ... CCS '17, 2017 | 106 | 2017 |
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM V van der Veen, M Lindorfer, Y Fratantonio, HP Pillai, G Vigna, C Kruegel, ... DIMVA '18, 2018 | 92 | 2018 |
Blacksmith: Scalable Rowhammering in the Frequency Domain P Jattke, V van der Veen, P Frigo, S Gunter, K Razavi S&P 2022, 2022 | 81 | 2022 |
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications H Hassan, YC Tugrul, JS Kim, V Van der Veen, K Razavi, O Mutlu MICRO-54, 2021 | 79 | 2021 |
Enter Sandbox: Android Sandbox Comparison S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ... MoST '14, 2014 | 75 | 2014 |
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication RK Konoth, V van der Veen, H Bos FC '16, 2016 | 71 | 2016 |
Dynamic Analysis of Android Malware V van der Veen, H Bos, C Rossow Vrije Universiteit Amsterdam, 2013 | 64 | 2013 |
MARX: Uncovering Class Hierarchies in C++ Programs A Pawlowski, M Contag, V van der Veen, C Ouwehand, T Holz, H Bos, ... NDSS '17, 2017 | 60 | 2017 |
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching A Pawlowski, V van der Veen, D Andriesse, E van der Kouwe, T Holz, ... ACSAC '19, 2019 | 8 | 2019 |
DroydSeuss: A Mobile Banking Trojan Tracker - Short Paper A Coletta, V van der Veen, F Maggi FC '16, 2016 | 8 | 2016 |
DramaQueen: Revisiting Side Channels in DRAM V van der Veen, B Gras DRAMSec '23, 2023 | 1 | 2023 |
Dram with quick random row refresh for rowhammer mitigation V VAN DER VEEN, M Saifuddin, P Deshmukh, B Dashtipour, D Hartley US Patent App. 17/445,220, 2022 | 1 | 2022 |