Follow
Nathan Burow
Nathan Burow
MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
3992017
SoK: Shining light on shadow stacks
N Burow, X Zhang, M Payer
2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019
2082019
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
S Dinesh, N Burow, D Xu, M Payer
2020 IEEE Symposium on Security and Privacy (SP), 128-142, 2020
1922020
CFIXX: Object Type Integrity for C++
N Burow, D McKee, SA Carr, M Payer
NDSS, 2018
71*2018
Preventing Kernel Hacks with HAKC
D McKee, Y Giannaris, CO Perez, H Shrobe, M Payer, H Okhravi, ...
Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022
562022
CUP: Comprehensive User-Space Protection for C/C++
N Burow, D McKee, SA Carr, M Payer
AsiaCCS, 2018
512018
{FuZZan}: Efficient sanitizer metadata design for fuzzing
Y Jeon, WH Han, N Burow, M Payer
2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020
472020
Keeping Safe Rust Safe with Galeed
E Rivera, S Mergendahl, H Shrobe, H Okhravi, N Burow
Annual Computer Security Applications Conference, 824-836, 2021
422021
Cross-Language Attacks
S Mergendahl, N Burow, H Okhravi
Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022
322022
TAG: Tagged Architecture Guide
S Jero, N Burow, B Ward, R Skowyra, R Khazan, H Shrobe, H Okhravi
ACM Computing Surveys 55 (6), 1-34, 2022
192022
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
152021
Code Specialization through Dynamic Feature Observation
P Biswas, N Burow, M Payer
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
152021
A risk assessment tool for advanced metering infrastructures
T Shawly, J Liu, N Burow, S Bagchi, R Berthier, RB Bobba
2014 IEEE International Conference on Smart Grid Communications …, 2014
152014
Moving Target Defense Considerations in Real-Time Safety-and Mission-Critical Systems
N Burow, R Burrow, R Khazan, H Shrobe, BC Ward
Proceedings of the 7th ACM Workshop on Moving Target Defense, 81-89, 2020
132020
One Giant Leap for Computer Security
H Okhravi, N Burow, R Skowyra, B Ward, S Jero, R Khazan, H Shrobe
IEEE Security & Privacy, 2020
62020
Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework
D McKee, N Burow, M Payer
arXiv preprint arXiv:1906.02928, 2019
32019
Security Considerations for Next-Generation Operating Systems for Cyber-Physical Systems
BC Ward, R Skowyra, S Jero, N Burow, H Okhravi, H Shrobe, R Khazan
MIT Lincoln Laboratory, 2019
22019
TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems
C Nord, S Caspin, CE Nemitz, H Shrobe, H Okhravi, JH Anderson, ...
2021 IEEE Real-Time Systems Symposium (RTSS), 469-481, 2021
12021
Research Frontiers for Moving Target Defenses
N Burow
Proceedings of the 8th ACM Workshop on Moving Target Defense, 27-28, 2021
2021
Analyzing Control-flow-based Glitching Attacks and Defenses
C Spensky, A MacHiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20