Dennis Andriesse

Affiliations:
  • VU University Amsterdam, Department of Computer Science, The Netherlands


According to our database1, Dennis Andriesse authored at least 17 papers between 2013 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Benchmarking Flaws Undermine Security Research.
IEEE Secur. Priv., 2020

: Practical Cache Attacks from the Network.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
SoK: Benchmarking Flaws in Systems Security.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Benchmarking Crimes: An Emerging Threat in Systems Security.
CoRR, 2018

ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Now You See Me: Real-time Dynamic Function Call Detection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Compiler-Agnostic Function Detection in Binaries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Reliable Recon in Adversarial Peer-to-Peer Botnets.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Practical Context-Sensitive CFI.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013


  Loading...