Readactor: Practical code randomization resilient to memory disclosure S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... IEEE Symposium on Security and Privacy, S&P 15, 2015 | 333 | 2015 |
Losing control: On the effectiveness of control-flow integrity under stack attacks M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 217 | 2015 |
Thwarting cache side-channel attacks through dynamic software diversity S Crane, A Homescu, S Brunthaler, P Larsen, M Franz Network And Distributed System Security Symposium, NDSS 15, 2015 | 208 | 2015 |
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks S Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 174 | 2015 |
Leakage-resilient layout randomization for mobile devices K Braden, S Crane, L Davi, M Franz, P Larsen, C Liebchen, AR Sadeghi Proceedings of the 2016 Network and Distributed System Security (NDSS) Symposium, 2016 | 125 | 2016 |
Address-Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ... Proceedings of the Network and Distributed System Security Symposium (NDSS’17), 2017 | 92 | 2017 |
Booby trapping software S Crane, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013 | 77 | 2013 |
Diversifying the software stack using randomized NOP insertion T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz Moving Target Defense II, 151-173, 2013 | 72 | 2013 |
Selfrando: Securing the Tor Browser against De-anonymization Exploits M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ... Proceedings on Privacy Enhancing Technologies 2016 (4), 454-469, 2016 | 63 | 2016 |
Large-scale automated software diversity—program evolution redux A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz IEEE Transactions on Dependable and Secure Computing, 1-1, 2017 | 48 | 2017 |
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks P Rajasekaran, S Crane, D Gens, Y Na, S Volckaert, M Franz Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 27 | 2020 |
Code randomization: Haven’t we solved this problem yet? S Crane, A Homescu, P Larsen 2016 IEEE Cybersecurity Development (SecDev), 124-129, 2016 | 22 | 2016 |
Similarity-based matching meets Malware Diversity M Payer, S Crane, P Larsen, S Brunthaler, R Wartell, M Franz arXiv preprint arXiv:1409.7760, 2014 | 9 | 2014 |
Return to Where? You Can’t Exploit What You Can’t Find S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... Proceedings of Black Hat USA, 2015 | 3 | 2015 |
Software diversification in external contexts A Homescu, SJ Crane, P Larsen US Patent App. 15/871,663, 2018 | | 2018 |
Diversity and information leaks S Crane, A Homescu, P Larsen, H Okhravi, M Franz The Continuing Arms Race, 61-79, 2018 | | 2018 |
The Continuing Arms Race: Code-Reuse Attacks and Defenses S Crane, A Homescu, P Larsen, H Okhravi, M Franz MIT Lincoln Laboratory Lexington United States, 2018 | | 2018 |
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization VS Dedhia, AR Sadeghi, RW Skowyra, D Bigelow, RA Rudd, H Okhravi, ... MIT Lincoln Laboratory Lexington United States, 2016 | | 2016 |
Execute-Only Attacks against Execute-Only Defenses H Okhravi, R Rudd, T Hobson, D Bigelow, R Skowyra, V Dedhia, S Crane, ... MIT Lincoln Laboratory Lexington United States, 2015 | | 2015 |
Enhancing and Extending Software Diversity S Crane UNIVERSITY OF CALIFORNIA, IRVINE, 2015 | | 2015 |