Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Dennis Andriesse"'
Publikováno v:
2020 IEEE Symposium on Security and Privacy (SP): Proceedings, 20-38
STARTPAGE=20;ENDPAGE=38;TITLE=2020 IEEE Symposium on Security and Privacy (SP)
Kurth, M, Gras, B, Andriesse, D, Giuffrida, C, Bos, H & Razavi, K 2020, NetCAT: Practical cache attacks from the network . in 2020 IEEE Symposium on Security and Privacy (SP) : Proceedings ., 9152768, Proceedings-IEEE Symposium on Security and Privacy, vol. 2020-May, Institute of Electrical and Electronics Engineers Inc., pp. 20-38, 41st IEEE Symposium on Security and Privacy, SP 2020, San Francisco, United States, 18/05/20 . https://doi.org/10.1109/SP40000.2020.00082
2020 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
STARTPAGE=20;ENDPAGE=38;TITLE=2020 IEEE Symposium on Security and Privacy (SP)
Kurth, M, Gras, B, Andriesse, D, Giuffrida, C, Bos, H & Razavi, K 2020, NetCAT: Practical cache attacks from the network . in 2020 IEEE Symposium on Security and Privacy (SP) : Proceedings ., 9152768, Proceedings-IEEE Symposium on Security and Privacy, vol. 2020-May, Institute of Electrical and Electronics Engineers Inc., pp. 20-38, 41st IEEE Symposium on Security and Privacy, SP 2020, San Francisco, United States, 18/05/20 . https://doi.org/10.1109/SP40000.2020.00082
2020 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
Increased peripheral performance is causing strain on the memory subsystem of modern processors. For example, available DRAM throughput can no longer sustain the traffic of a modern network card. Scrambling to deliver the promised performance, instea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::082e008dcd21447a60fd89e28ff066ba
https://research.vu.nl/en/publications/48b85d27-4181-4d79-8ca4-76fe35bb2077
https://research.vu.nl/en/publications/48b85d27-4181-4d79-8ca4-76fe35bb2077
Autor:
Dennis Andriesse, Thorsten Holz, Andre Pawlowski, Herbert Bos, Cristiano Giuffrida, Erik van der Kouwe, Victor van der Veen
Publikováno v:
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferenceDecember 2019, 97-112
STARTPAGE=97;ENDPAGE=112;TITLE=ACSAC '19
ACSAC
Pawlowski, A, van der Veen, V, Andriesse, D, van der Kouwe, E, Holz, T, Giuffrida, C & Bos, H 2019, VPS: Excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching . in ACSAC '19 : Proceedings of the 35th Annual Computer Security Applications ConferenceDecember 2019 . ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 97-112, 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, United States, 9/12/19 . https://doi.org/10.1145/3359789.3359797
Proceedings of the 35th Annual Computer Security Applications Conference
STARTPAGE=97;ENDPAGE=112;TITLE=ACSAC '19
ACSAC
Pawlowski, A, van der Veen, V, Andriesse, D, van der Kouwe, E, Holz, T, Giuffrida, C & Bos, H 2019, VPS: Excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching . in ACSAC '19 : Proceedings of the 35th Annual Computer Security Applications ConferenceDecember 2019 . ACM International Conference Proceeding Series, Association for Computing Machinery, pp. 97-112, 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, United States, 9/12/19 . https://doi.org/10.1145/3359789.3359797
Proceedings of the 35th Annual Computer Security Applications Conference
Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::63b9c6900e9f1b14f6897595421cf826
https://research.vu.nl/en/publications/721872bb-727a-4ee8-91e4-86f09774e91b
https://research.vu.nl/en/publications/721872bb-727a-4ee8-91e4-86f09774e91b
Publikováno v:
EuroS&P
van der Kouwe, E, Heiser, G, Andriesse, D, Bos, H & Giuffrida, C 2019, SoK: Benchmarking flaws in systems security . in 2019 IEEE European Symposium on Security and Privacy (EURO S and P) : [Proceedings] ., 8806739, Institute of Electrical and Electronics Engineers Inc., pp. 310-325, 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, Stockholm, Sweden, 17/06/19 . https://doi.org/10.1109/EuroSP.2019.00031
Proceedings-4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, 310-325
STARTPAGE=310;ENDPAGE=325;TITLE=Proceedings-4th IEEE European Symposium on Security and Privacy, EURO S and P 2019
2019 IEEE European Symposium on Security and Privacy (EuroS&P)
van der Kouwe, E, Heiser, G, Andriesse, D, Bos, H & Giuffrida, C 2019, SoK: Benchmarking flaws in systems security . in 2019 IEEE European Symposium on Security and Privacy (EURO S and P) : [Proceedings] ., 8806739, Institute of Electrical and Electronics Engineers Inc., pp. 310-325, 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, Stockholm, Sweden, 17/06/19 . https://doi.org/10.1109/EuroSP.2019.00031
Proceedings-4th IEEE European Symposium on Security and Privacy, EURO S and P 2019, 310-325
STARTPAGE=310;ENDPAGE=325;TITLE=Proceedings-4th IEEE European Symposium on Security and Privacy, EURO S and P 2019
2019 IEEE European Symposium on Security and Privacy (EuroS&P)
Properly benchmarking a system is a difficult and intricate task. Even a seemingly innocuous mistake can compromise the guarantees provided by a systems security defense and threaten reproducibility and comparability. Moreover, as many modern defense
Autor:
Dennis Andriesse
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way.As malware increa
Publikováno v:
ACSAC
De Goër, F, Rawat, S, Andriesse, D, Bos, H & Groz, R 2018, Now you see me : Real-time dynamic function call detection . in ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference . Association for Computing Machinery, San Juan, PR, pp. 618-628, 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, United States, 3/12/18 . https://doi.org/10.1145/3274694.3274712
ACSAC 2018: Annual Computer Security Applications Conference
ACSAC 2018: Annual Computer Security Applications Conference, Dec 2018, San Juan, Puerto Rico
ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference, 618-628
STARTPAGE=618;ENDPAGE=628;TITLE=ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference
De Goër, F, Rawat, S, Andriesse, D, Bos, H & Groz, R 2018, Now you see me : Real-time dynamic function call detection . in ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference . Association for Computing Machinery, San Juan, PR, pp. 618-628, 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, United States, 3/12/18 . https://doi.org/10.1145/3274694.3274712
ACSAC 2018: Annual Computer Security Applications Conference
ACSAC 2018: Annual Computer Security Applications Conference, Dec 2018, San Juan, Puerto Rico
ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference, 618-628
STARTPAGE=618;ENDPAGE=628;TITLE=ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference
Efficient detection and instrumentation of function calls is fundamental for a variety of dynamic analysis techniques, including dynamic callgraph construction, control-flow integrity, and automatic vulnerability discovery. A common way of detecting
Autor:
Xi Chen, Manolis Stamatogiannakis, Victor van der Veen, Herbert Bos, Cristiano Giuffrdia, Dennis Andriesse
Publikováno v:
CCS
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security-CCS 17
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Part F131467, 1675-1689
Veen, V V, Andriesse, D, Stamatogiannakis, M, Chen, X, Bos, H & Giuffrida, C 2017, The dynamics of innocent flesh on the bone : Code reuse ten years later . in CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . vol. Part F131467, Association for Computing Machinery, pp. 1675-1689, 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, United States, 30/10/17 . https://doi.org/10.1145/3133956.3134026
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security-CCS 17
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17
CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Part F131467, 1675-1689
Veen, V V, Andriesse, D, Stamatogiannakis, M, Chen, X, Bos, H & Giuffrida, C 2017, The dynamics of innocent flesh on the bone : Code reuse ten years later . in CCS 2017-Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . vol. Part F131467, Association for Computing Machinery, pp. 1675-1689, 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, United States, 30/10/17 . https://doi.org/10.1145/3133956.3134026
In 2007, Shacham published a seminal paper on Return-Oriented Programming (ROP), the first systematic formulation of code reuse. The paper has been highly influential, profoundly shaping the way we still think about code reuse today: An attacker anal
Publikováno v:
Internet Measurement Conference
Proceedings of the 2015 ACM Internet Measurement Conference (IMC)
Andriesse, D A, Rossow, C & Bos, H J 2015, Reliable Recon in Adversarial Peer-to-Peer Botnets . in Proceedings of the 2015 ACM Internet Measurement Conference (IMC) .
Vrije Universiteit Amsterdam
Proceedings of the 2015 ACM Internet Measurement Conference (IMC)
Andriesse, D A, Rossow, C & Bos, H J 2015, Reliable Recon in Adversarial Peer-to-Peer Botnets . in Proceedings of the 2015 ACM Internet Measurement Conference (IMC) .
Vrije Universiteit Amsterdam
The decentralized nature of Peer-to-Peer (P2P) botnets precludes traditional takedown strategies, which target dedicated command infrastructure. P2P botnets replace this infrastructure with command channels distributed across the full infected popula
Publikováno v:
DSN
Parallax is a novel self-contained code integrity verification approach, that protects instructions by overlapping Return-Oriented Programming (ROP) gadgets with them. Our technique implicitly verifies integrity by translating selected code (verifica
Autor:
Herbert Bos, Dennis Andriesse
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319085081
Trigger-based malware is designed to remain dormant and undetected unless a specific trigger occurs. Such behavior occurs in prevalent threats such as backdoors and environment-dependent (targeted) malware. Currently, trigger-based malicious code is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::56707c08b1a5a72039dff67f9c601683
https://doi.org/10.1007/978-3-319-08509-8_3
https://doi.org/10.1007/978-3-319-08509-8_3
Publikováno v:
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus.