Lucas Davi
Orcid: 0000-0002-7322-2777Affiliations:
- University of Duisburg-Essen, Institute for Computer Science and Business Information Systems (ICB), Essen, Germany
According to our database1,
Lucas Davi
authored at least 74 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the International Conference on Computer-Aided Design, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the International Conference on Compilers, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-25546-0, 2015
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the SPSM'11, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009