Hans Liljestrand

Orcid: 0000-0003-0485-679X

According to our database1, Hans Liljestrand authored at least 24 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts.
IEEE Secur. Priv., 2024

BliMe Linter.
Proceedings of the IEEE Secure Development Conference, 2024

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2022
Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022

Color My World: Deterministic Tagging for Memory Safety.
CoRR, 2022

Towards cryptographically-authenticated in-memory data structures.
Proceedings of the IEEE Secure Development Conference, 2022

2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021

PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021

Tutorial: Investigating Advanced Exploits for System Security Assurance.
Proceedings of the IEEE Secure Development Conference, 2021

2020
Hardware-assisted memory safety.
PhD thesis, 2020

Camouflage: Hardware-assisted CFI for the ARM Linux kernel.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
Exploitation Techniques and Defenses for Data-Oriented Attacks.
CoRR, 2019

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
Proceedings of the 28th USENIX Security Symposium, 2019

Protecting the stack with PACed canaries.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Authenticated Call Stack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Toward Linux kernel memory safety.
Softw. Pract. Exp., 2018

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization.
CoRR, 2018

2017
Towards Linux Kernel Memory Safety.
CoRR, 2017

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

2016
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016


  Loading...