2024
Migrating C to Rust for Memory Safety.
IEEE Secur. Priv., 2024
Situational Awareness Data Extraction from Cooperative Virtual Reality Maritime Training Simulations.
Proceedings of 22nd European Conference on Computer-Supported Cooperative Work, 2024
2022
PKRU-safe: automatically locking down the heap between safe and unsafe languages.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
2021
dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
2020
Distributed Heterogeneous N-Variant Execution.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Adoption Challenges of Code Randomization.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
2019
DMON: A Distributed Heterogeneous N-Variant System.
CoRR, 2019
SoK: Sanitizing for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Changing the Game of Software Security.
IEEE Secur. Priv., 2018
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Hardware Assisted Randomization of Data.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Diversity and information leaks.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Large-Scale Automated Software Diversity - Program Evolution Redux.
IEEE Trans. Dependable Secur. Comput., 2017
Control-Flow Integrity: Precision, Security, and Performance.
ACM Comput. Surv., 2017
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017
2016
Thinking Inside the Box: Compartmentalized Garbage Collection.
ACM Trans. Program. Lang. Syst., 2016
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016
Multi-Variant Execution of Parallel Programs.
CoRR, 2016
Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Code Randomization: Haven't We Solved This Problem Yet?
Proceedings of the IEEE Cybersecurity Development, 2016
Leakage-Resilient Layout Randomization for Mobile Devices.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016
Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015
Automatic Software Diversity.
IEEE Secur. Priv., 2015
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
An Efficient and Generic Event-based Profiler Framework for Dynamic Languages.
Proceedings of the Principles and Practices of Programming on The Java Platform, 2015
Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Safe and efficient hybrid memory management for Java.
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Efficient hosted interpreters on the JVM.
ACM Trans. Archit. Code Optim., 2014
Genus zero graph segmentation: Estimation of intracranial volume.
Pattern Recognit. Lett., 2014
Security through Diversity: Are We There Yet?
IEEE Secur. Priv., 2014
Similarity-based matching meets Malware Diversity.
CoRR, 2014
SoK: Automated Software Diversity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Comparing points-to static analysis with runtime recorded profiling data.
Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, 2014
Accelerating iterators in optimizing AST interpreters.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014
Software Profiling Options and Their Effects on Security Based Diversification.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Diversifying the Software Stack Using Randomized NOP Insertion.
Proceedings of the Moving Target Defense II, 2013
Information flow tracking meets just-in-time compilation.
ACM Trans. Archit. Code Optim., 2013
Towards Precise and Efficient Information Flow Control in Web Browsers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
First-Class Labels: Using Information Flow to Debug Security Holes.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Efficient interpreter optimizations for the JVM.
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013
Proceedings of the New Security Paradigms Workshop, 2013
CrowdFlow: Efficient Information Flow Security.
Proceedings of the Information Security, 16th International Conference, 2013
Profile-guided automated software diversity.
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013
Librando: transparent code randomization for just-in-time compilers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Parallelizing more Loops with Compiler Guided Refactoring.
Proceedings of the 41st International Conference on Parallel Processing, 2012
Fine-grained modularity and reuse of virtual machine components.
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012
2011
Expressing Coarse-Grain Dependencies Among Tasks in Shared Memory Programs.
IEEE Trans. Ind. Informatics, 2011
Automated quantification and analysis of facial asymmetry in children with arthritis in the temporomandibular joint.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011
2010
Text Message Price Gouging: A Perfect Storm of Tacit Collusion.
J. Telecommun. High Technol. Law, 2010
Automated quantification and analysis of mandibular asymmetry.
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010
2009
Identifying Inter-task Communication in Shared Memory Programming Models.
Proceedings of the Evolving OpenMP in an Age of Extreme Parallelism, 2009
2007
Sparse Statistical Deformation Model for the Analysis of Craniofacial Malformations in the Crouzon Mouse.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007
A Statistical Model of Head Asymmetry in Infants with Deformational Plagiocephaly.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007
Craniofacial statistical deformation models of wild-type mice and Crouzon mice.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Medical Imaging 2007: Image Processing, 2007
A Point-Wise Quantification of Asymmetry Using Deformation Fields: Application to the Study of the Crouzon Mouse Model.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2007, 10th International Conference, Brisbane, Australia, October 29, 2007
Estimation of Independent Non-Linear Deformation Modes for Analysis of Craniofacial Malformations in Crouzon Mice.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007