Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Liebchen, Christopher"'
Autor:
Liebchen, Christopher
Adversaries exploit software vulnerabilities in modern software to compromise computer systems. While the amount and sophistication of such attacks is constantly increasing, most of them are based on memory-corruption vulnerabilities ---a problem tha
Externí odkaz:
https://tuprints.ulb.tu-darmstadt.de/8090/1/Liebchen-PhD-Advancing-Memory-corruption-Attacks-and-Defenses.pdf
Rowhammer is a hardware bug that can be exploited to implement privilege escalation and remote code execution attacks. Previous proposals on rowhammer mitigation either require hardware changes or follow heuristic-based approaches (based on CPU perfo
Externí odkaz:
http://arxiv.org/abs/1611.08396
Autor:
Braden, Kjell, Crane, Stephen, Davi, Lucas, Franz, Michael, Larsen, Per, Liebchen, Christopher, Sadegh, Ahmad-Reza
Publikováno v:
NDSS 2016, Network and Distributed System Security Symposium, 21-24 February 2016, San Diego, CA, USA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1093::2a2cd00f8954593cdc65cb00be434128
http://www.eurecom.fr/publication/4797
http://www.eurecom.fr/publication/4797
Autor:
Dmitrienko, Alexandra1 alexandra.dmitrienko@sit.fraunhofer.de, Liebchen, Christopher2 christopher.liebchen@cased.de, Rossow, Christian3 c.rossow@vu.nl, Sadeghi, Ahmad-Reza4 ahmad.sadeghi@trust.cased.de
Publikováno v:
Intel Technology Journal. 2014, Vol. 18 Issue 4, p138-161. 24p.
Autor:
Ganapathy, Vinod, Iftode, Liviu, Sadeghi, Ahmad-Reza, Brasser, Ferdinand, Kim, Daeyoung, Liebchen, Christopher
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments. They can be used to exfiltrate sensitive information from enterprises and federal offices or be used to smuggle unauthori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cdfc57c319ff53c79bfd19e49ab92874
Autor:
Crane, Stephen, Liebchen, Christopher, Homescu, Andrei, Davi, Lucas, Larsen, Per, Sadeghi, Ahmad-Reza, Brunthaler, Stefan, Franz, Michael
Publikováno v:
2015 IEEE Symposium on Security & Privacy; 2015, p763-780, 18p
Autor:
Schuster, Felix, Tendyck, Thomas, Liebchen, Christopher, Davi, Lucas, Sadeghi, Ahmad-Reza, Holz, Thorsten
Publikováno v:
2015 IEEE Symposium on Security & Privacy; 2015, p745-762, 18p
Publikováno v:
Financial Cryptography & Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers; 2014, p365-383, 19p
Autor:
Snow, Kevin Z., Monrose, Fabian, Davi, Lucas, Dmitrienko, Alexandra, Liebchen, Christopher, Sadeghi, Ahmad-Reza
Publikováno v:
2013 IEEE Symposium on Security & Privacy; 2013, p574-588, 15p