364 results on '"Herbert Bos"'
Search Results
2. InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
3. Practical Data-Only Attack Generation.
4. Uncontained: Uncovering Container Confusion in the Linux Kernel.
5. FloatZone: Accelerating Memory Error Detection using the Floating Point Unit.
6. Triereme: Speeding up hybrid fuzzing through efficient query scheduling.
7. Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation.
8. TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.
9. Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
10. Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots.
11. DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.
12. DangZero: Efficient Use-After-Free Detection via Direct Page Table Access.
13. On the effectiveness of same-domain memory deduplication.
14. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.
15. PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination.
16. FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection.
17. Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks.
18. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
19. CrossTalk: Speculative Data Leaks Across Cores Are Real.
20. LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating.
21. CollabFuzz: A Framework for Collaborative Fuzzing.
22. BinRec: dynamic binary lifting and recompilation.
23. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
24. SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
25. ParmeSan: Sanitizer-guided Greybox Fuzzing.
26. TRRespass: Exploiting the Many Sides of Target Row Refresh.
27. : Practical Cache Attacks from the Network.
28. Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing.
29. Speculative Probing: Hacking Blind in the Spectre Era.
30. PANDAcap: a framework for streamlining collection of full-system traces.
31. Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
32. ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations.
33. kMVX: Detecting Kernel Information Leaks with Multi-variant Execution.
34. SoK: Benchmarking Flaws in Systems Security.
35. RIDL: Rogue In-Flight Data Load.
36. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
37. VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
38. ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
39. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
40. Towards Automated Vulnerability Scanning of Network Servers.
41. Delta pointers: buffer overflow checks without the checks.
42. On the Effectiveness of Code Normalization for Function Identification.
43. Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
44. Throwhammer: Rowhammer Attacks over the Network and Defenses.
45. Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
46. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
47. Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
48. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
49. Now You See Me: Real-time Dynamic Function Call Detection.
50. TIFF: Using Input Type Inference To Improve Fuzzing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.