Per Larsen
Per Larsen
Vahvistettu sähköpostiosoite verkkotunnuksessa uci.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
SoK: Automated software diversity
P Larsen, A Homescu, S Brunthaler, M Franz
2014 IEEE Symposium on Security and Privacy, 276-291, 2014
3512014
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
2532015
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
1882017
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
1802015
Profile-guided automated software diversity
A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013
1552013
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1512015
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
S Crane, A Homescu, S Brunthaler, P Larsen, M Franz
NDSS, 8-11, 2015
1502015
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1362015
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1032016
Librando: transparent code randomization for just-in-time compilers
A Homescu, S Brunthaler, P Larsen, M Franz
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013
962013
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz
WOOT 12, 64-76, 2012
712012
Booby trapping software
S Crane, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013
642013
SoK: sanitizing for security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019
622019
Security through diversity: Are we there yet?
P Larsen, S Brunthaler, M Franz
IEEE Security & Privacy 12 (2), 28-35, 2013
572013
Diversifying the software stack using randomized NOP insertion
T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz
Moving Target Defense II, 151-173, 2013
562013
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
532017
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 167-179, 2016
472016
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
402016
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
PoPETs 2016 (4), 454-469, 2016
372016
Large-scale automated software diversity—program evolution redux
A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz
IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015
292015
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20