Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Erik Bosman"'
Publikováno v:
EuroSec '22: Proceedings of the 15th European Workshop on Systems Security, 29-35
STARTPAGE=29;ENDPAGE=35;TITLE=EuroSec '22
Costi, A, Johannesmeyer, B, Bosman, E, Giuffrida, C & Bos, H 2022, On the Effectiveness of Same-Domain Memory Deduplication . in EuroSec '22 : Proceedings of the 15th European Workshop on Systems Security . Association for Computing Machinery, Inc, pp. 29-35, 15th European Workshop on Systems Security, EuroSec 2022, Virtual, Online, France, 5/04/22 . https://doi.org/10.1145/3517208.3523754
STARTPAGE=29;ENDPAGE=35;TITLE=EuroSec '22
Costi, A, Johannesmeyer, B, Bosman, E, Giuffrida, C & Bos, H 2022, On the Effectiveness of Same-Domain Memory Deduplication . in EuroSec '22 : Proceedings of the 15th European Workshop on Systems Security . Association for Computing Machinery, Inc, pp. 29-35, 15th European Workshop on Systems Security, EuroSec 2022, Virtual, Online, France, 5/04/22 . https://doi.org/10.1145/3517208.3523754
Memory deduplication, an OS memory optimization technique that merges identical pages into a single Copy-on-Write (CoW) page, has been shown to be susceptible to a variety of timing side channel attacks, all of which stem from the differences between
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9cf5cf2fc3a67284b58a28c93fd37512
https://research.vu.nl/en/publications/42915386-649d-43c1-a438-4271ea248d04
https://research.vu.nl/en/publications/42915386-649d-43c1-a438-4271ea248d04
Publikováno v:
NDSS
Autor:
Herbert Bos, Erik Bosman
Publikováno v:
IEEE Symposium on Security and Privacy
Signal handling has been an integral part of UNIX systems since the earliest implementation in the 1970s. Nowadays, we find signals in all common flavors of UNIX systems, including BSD, Linux, Solaris, Android, and Mac OS. While each flavor handles s
Autor:
Benjamin Kollenda, Erik Bosman, Cristiano Giuffrida, Georgios Portokalidis, Herbert Bos, Enes Goktas, Philipp Koppe, Thorsten Holz
Publikováno v:
2018 IEEE European Symposium on Security and Privacy (EuroS&P)
Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018, 227-242
STARTPAGE=227;ENDPAGE=242;TITLE=Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018
EuroS&P
Goktas, E, Kollenda, B, Koppe, P, Bosman, E, Portokalidis, G, Holz, T, Bos, H & Giuffrida, C 2018, Position-Independent Code Reuse : On the Effectiveness of ASLR in the Absence of Information Disclosure . in Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 . Institute of Electrical and Electronics Engineers Inc., pp. 227-242, 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018, London, United Kingdom, 24/04/18 . https://doi.org/10.1109/EuroSP.2018.00024
Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018, 227-242
STARTPAGE=227;ENDPAGE=242;TITLE=Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018
EuroS&P
Goktas, E, Kollenda, B, Koppe, P, Bosman, E, Portokalidis, G, Holz, T, Bos, H & Giuffrida, C 2018, Position-Independent Code Reuse : On the Effectiveness of ASLR in the Absence of Information Disclosure . in Proceedings-3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018 . Institute of Electrical and Electronics Engineers Inc., pp. 227-242, 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018, London, United Kingdom, 24/04/18 . https://doi.org/10.1109/EuroSP.2018.00024
Address-space layout randomization is a wellestablished defense against code-reuse attacks. However, it can be completely bypassed by just-in-time code-reuse attacks that rely on information disclosure of code addresses via memory or side-channel exp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6acc07b3835da6f2c8e61b369eeed3c
Publikováno v:
2016 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
Bosman, E, Razavi, K, Bos, H & Giuffrida, C 2016, Dedup Est Machina : Memory Deduplication as an Advanced Exploitation Vector . in Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016 ., 7546546, Institute of Electrical and Electronics Engineers, Inc., pp. 987-1004, 2016 IEEE Symposium on Security and Privacy, SP 2016, San Jose, United States, 23/05/16 . https://doi.org/10.1109/SP.2016.63
Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016, 987-1004
STARTPAGE=987;ENDPAGE=1004;TITLE=Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016
IEEE Symposium on Security and Privacy
Bosman, E, Razavi, K, Bos, H & Giuffrida, C 2016, Dedup Est Machina : Memory Deduplication as an Advanced Exploitation Vector . in Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016 ., 7546546, Institute of Electrical and Electronics Engineers, Inc., pp. 987-1004, 2016 IEEE Symposium on Security and Privacy, SP 2016, San Jose, United States, 23/05/16 . https://doi.org/10.1109/SP.2016.63
Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016, 987-1004
STARTPAGE=987;ENDPAGE=1004;TITLE=Proceedings-2016 IEEE Symposium on Security and Privacy, SP 2016
Memory deduplication, a well-known technique to reduce the memory footprint across virtual machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 operating systems. Deduplication maps multiple identical copies of a physical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d8b1d74343f1c7ced765f9a34eb2ea1e