Author of the publication

The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.

, , , , , and . ACM Conference on Computer and Communications Security, page 1675-1689. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Benchmarking Flaws in Systems Security., , , , and . EuroS&P, page 310-325. IEEE, (2019)SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets., , , , , , and . IEEE Symposium on Security and Privacy, page 97-111. IEEE Computer Society, (2013)VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching., , , , , , and . ACSAC, page 97-112. ACM, (2019)Now You See Me: Real-time Dynamic Function Call Detection., , , , and . ACSAC, page 618-628. ACM, (2018)ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks., , , , , , and . OSDI, page 697-710. USENIX Association, (2018)Benchmarking Crimes: An Emerging Threat in Systems Security., , , , and . CoRR, (2018)Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming., , and . DSN, page 125-135. IEEE Computer Society, (2015)Compiler-Agnostic Function Detection in Binaries., , and . EuroS&P, page 177-189. IEEE, (2017)Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus., , , , and . MALWARE, page 116-123. IEEE Computer Society, (2013)An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries., , , , and . USENIX Security Symposium, page 583-600. USENIX Association, (2016)