Anil Kurmus
According to our database1,
Anil Kurmus
authored at least 25 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2021
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2017
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
2016
Proceedings of the 9th European Workshop on System Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the Middleware 2011, 2011
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2008
IACR Cryptol. ePrint Arch., 2008