Practical Context-Sensitive CFI D Andriesse, V van der Veen, E Göktaş, B Gras, L Sambuc, A Slowinska, ... Proceedings of the 22nd Conference on Computer and Communications Security …, 2015 | 343* | 2015 |
Sok: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ... Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P'13), 97-111, 2013 | 242 | 2013 |
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries D Andriesse, X Chen, V van der Veen, A Slowinska, H Bos Proceedings of the 25th USENIX Security Symposium (USENIX Sec'16), 2016 | 220 | 2016 |
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos Proceedings of the 8th International Conference on Malicious and Unwanted …, 2013 | 165 | 2013 |
Compiler-Agnostic Function Detection in Binaries D Andriesse, A Slowinska, H Bos Proceedings of the 2nd IEEE European Symposium on Security and Privacy …, 2017 | 146 | 2017 |
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida Proceedings of the Network and Distributed System Security Symposium (NDSS'15), 2015 | 131 | 2015 |
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ... Proceedings of the 24th Conference on Computer and Communications Security, 2017 | 104 | 2017 |
{ZebRAM}: Comprehensive and compatible software protection against rowhammer attacks RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018 | 95 | 2018 |
NetCAT: Practical Cache Attacks from the Network M Kurth, B Gras, D Andriesse, C Giuffrida, H Bos, K Razavi 2020 IEEE Symposium on Security and Privacy (SP), 20-38, 2020 | 87 | 2020 |
Benchmarking Crimes: An Emerging Threat in Systems Security E van der Kouwe, D Andriesse, H Bos, C Giuffrida, G Heiser Preprint (https://arxiv.org/pdf/1801.02381.pdf), 2018 | 67* | 2018 |
Practical Binary Analysis D Andriesse | 39* | 2018 |
Reliable Recon in Adversarial Peer-to-Peer Botnets D Andriesse, C Rossow, H Bos Proceedings of the 15th Internet Measurement Conference (IMC'15), 2015 | 36 | 2015 |
An Analysis of the Zeus Peer-to-Peer Protocol D Andriesse, H Bos Technical Report, VU University Amsterdam, 2013 | 34 | 2013 |
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming D Andriesse, H Bos, A Slowinska Proceedings of the 45th Conference on Dependable Systems and Networks (DSN'15), 2015 | 33 | 2015 |
Instruction-Level Steganography for Covert Trigger-Based Malware D Andriesse, H Bos Proceedings of the 11th Conference on Detection of Intrusions and Malware …, 2014 | 23 | 2014 |
Computing device with increased resistance against rowhammer attacks RK Konoth, A Tatar, M Oliverio, D Andriesse, HJ Bos, C Giuffrida, ... US Patent App. 16/059,357, 2020 | 17 | 2020 |
Now you see me: Real-time dynamic function call detection F De Goër, S Rawat, D Andriesse, H Bos, R Groz Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 9 | 2018 |
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching A Pawlowski, V van der Veen, D Andriesse, E van der Kouwe, T Holz, ... Proceedings of the 35th Annual Computer Security Applications Conference, 97-112, 2019 | 8 | 2019 |
Benchmarking flaws undermine security research E Van Der Kouwe, G Heiser, D Andriesse, H Bos, C Giuffrida IEEE Security & Privacy 18 (3), 48-57, 2020 | 7 | 2020 |
Analyzing and securing binaries through static disassembly D Andriesse PhD thesis (Vrije Universiteit Amsterdam), 2017 | 4 | 2017 |