Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Taddeus Kroes"'
Autor:
Dixin Zhou, David Gens, Michael Franz, Stijn Volckaert, Prabhu Rajasekaran, Taddeus Kroes, Yeoul Na, Herbert Bos, Anil Altinay, Cristiano Giuffrida, Adrian Dabrowski, Joseph Nash
Publikováno v:
EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems, 1-16
STARTPAGE=1;ENDPAGE=16;TITLE=EuroSys '20
EuroSys
Altinay, A, Nash, J, Kroes, T, Rajasekaran, P, Zhou, D, Dabrowski, A, Gens, D, Na, Y, Volckaert, S, Giuffrida, C, Bos, H & Franz, M 2020, BinRec: dynamic binary lifting and recompilation . in EuroSys '20 : Proceedings of the Fifteenth European Conference on Computer Systems . Association for Computing Machinery, Inc, pp. 1-16, 15th European Conference on Computer Systems, EuroSys 2020, Heraklion, Greece, 27/04/20 . https://doi.org/10.1145/3342195.3387550
STARTPAGE=1;ENDPAGE=16;TITLE=EuroSys '20
EuroSys
Altinay, A, Nash, J, Kroes, T, Rajasekaran, P, Zhou, D, Dabrowski, A, Gens, D, Na, Y, Volckaert, S, Giuffrida, C, Bos, H & Franz, M 2020, BinRec: dynamic binary lifting and recompilation . in EuroSys '20 : Proceedings of the Fifteenth European Conference on Computer Systems . Association for Computing Machinery, Inc, pp. 1-16, 15th European Conference on Computer Systems, EuroSys 2020, Heraklion, Greece, 27/04/20 . https://doi.org/10.1145/3342195.3387550
Binary lifting and recompilation allow a wide range of install-Time program transformations, such as security hardening, deobfuscation, and reoptimization. Existing binary lifting tools are based on static disassembly and thus have to rely on heurist
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::836e19773e30cb198f4a1c654baacdce
https://research.vu.nl/en/publications/45d3d3d5-244d-44f9-b93b-aef9bef14cc2
https://research.vu.nl/en/publications/45d3d3d5-244d-44f9-b93b-aef9bef14cc2
Publikováno v:
ACSAC
ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference, 17-27
STARTPAGE=17;ENDPAGE=27;TITLE=ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference
Proceedings of the 34th Annual Computer Security Applications Conference on-ACSAC 18
Proceedings of the 34th Annual Computer Security Applications Conference on -ACSAC '18
Van Der Kouwe, E, Kroes, T, Ouwehand, C, Bos, H & Giuffrida, C 2018, Type-after-type : Practical and complete type-safe memory reuse . in ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference . Association for Computing Machinery, San Juan, PR, pp. 17-27, 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, United States, 3/12/18 . https://doi.org/10.1145/3274694.3274705
ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference, 17-27
STARTPAGE=17;ENDPAGE=27;TITLE=ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference
Proceedings of the 34th Annual Computer Security Applications Conference on-ACSAC 18
Proceedings of the 34th Annual Computer Security Applications Conference on -ACSAC '18
Van Der Kouwe, E, Kroes, T, Ouwehand, C, Bos, H & Giuffrida, C 2018, Type-after-type : Practical and complete type-safe memory reuse . in ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference . Association for Computing Machinery, San Juan, PR, pp. 17-27, 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, United States, 3/12/18 . https://doi.org/10.1145/3274694.3274705
Temporal memory errors, such as use-after-free bugs, are increasingly popular among attackers and their exploitation is hard to stop efficiently using current techniques. We present a new design, called Type-After-Type, which builds on abstractions i
Publikováno v:
Proceedings of the 13th EuroSys Conference, EuroSys 2018, 1-14
STARTPAGE=1;ENDPAGE=14;TITLE=Proceedings of the 13th EuroSys Conference, EuroSys 2018
EuroSys
Kroes, T, Koning, K, van der Kouwe, E, Bos, H & Giuffrida, C 2018, Delta Pointers : Buffer Overflow Checks Without the Checks . in Proceedings of the 13th EuroSys Conference, EuroSys 2018 ., 22, Association for Computing Machinery, Inc, pp. 1-14, 13th EuroSys Conference, EuroSys 2018, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190553
STARTPAGE=1;ENDPAGE=14;TITLE=Proceedings of the 13th EuroSys Conference, EuroSys 2018
EuroSys
Kroes, T, Koning, K, van der Kouwe, E, Bos, H & Giuffrida, C 2018, Delta Pointers : Buffer Overflow Checks Without the Checks . in Proceedings of the 13th EuroSys Conference, EuroSys 2018 ., 22, Association for Computing Machinery, Inc, pp. 1-14, 13th EuroSys Conference, EuroSys 2018, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190553
Despite decades of research, buffer overflows still rank among the most dangerous vulnerabilities in unsafe languages such as C and C++. Compared to other memory corruption vulnerabilities, buffer overflows are both common and typically easy to explo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7beb61dbdadd7ca5fb56dd864d5c7cb
https://research.vu.nl/en/publications/4de3ea56-0adb-44b4-ace2-c4d4e49aeb5d
https://research.vu.nl/en/publications/4de3ea56-0adb-44b4-ace2-c4d4e49aeb5d
Autor:
Cristiano Giuffrida, Stijn Volckaert, Michael Franz, Yeoul Na, Herbert Bos, Anil Altinay, Joseph Nash, Taddeus Kroes
Publikováno v:
Kroes, T, Altinay, A, Nash, J, Na, Y, Volckaert, S, Bos, H, Franz, M & Giuffrida, C 2018, BinRec : Atack surface reduction through dynamic binary recovery . in FEAST 2018-Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2018 . Association for Computing Machinery, pp. 8-13, 2018 Workshop on Forming an Ecosystem Around Software Transformation, FEAST, held in conjunction with the 25th ACM Conference on Computer and Communications Security, CCS 2018, Toronto, Canada, 19/10/18 . https://doi.org/10.1145/3273045.3273050
FEAST 2018-Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2018, 8-13
STARTPAGE=8;ENDPAGE=13;TITLE=FEAST 2018-Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2018
FEAST 2018-Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2018, 8-13
STARTPAGE=8;ENDPAGE=13;TITLE=FEAST 2018-Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2018
Compile-time specialization and feature pruning through static binary rewriting have been proposed repeatedly as techniques for reducing the attack surface of large programs, and for minimizing the trusted computing base. We propose a new approach to
Publikováno v:
Proceedings of the 10th European Workshop on Systems Security-EuroSec17
Proceedings of the 10th European Workshop on Systems Security-EuroSec'17
Vrije Universiteit Amsterdam
Kroes, T, Koning, K, Giuffrida, C, Bos, H & van der Kouwe, E 2017, Fast and Generic Metadata Management with Mid-Fat Pointers . in Proceedings of the 10th European Workshop on Systems Security . ACM, pp. 9, EuroSec 2017, Belgrade, Serbia, 23/04/17 .
Proceedings of the 10th European Workshop on Systems Security
EUROSEC
Proceedings of the 10th European Workshop on Systems Security-EuroSec'17
Vrije Universiteit Amsterdam
Kroes, T, Koning, K, Giuffrida, C, Bos, H & van der Kouwe, E 2017, Fast and Generic Metadata Management with Mid-Fat Pointers . in Proceedings of the 10th European Workshop on Systems Security . ACM, pp. 9, EuroSec 2017, Belgrade, Serbia, 23/04/17 .
Proceedings of the 10th European Workshop on Systems Security
EUROSEC
Object metadata management schemes are a fundamental building block in many modern defenses and significantly affect the overall run-time overhead of a software hardening solution. To support fast metadata lookup, many metadata management schemes emb
Publikováno v:
Cojocar, L, Kroes, T & Bos, H 2017, JTR : A binary solution for switch-case recovery . in Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings . vol. 10379 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10379 LNCS, Springer/Verlag, pp. 177-195, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, Bonn, Germany, 3/07/17 . https://doi.org/10.1007/978-3-319-62105-0_12
Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings, 10379 LNCS, 177-195
Lecture Notes in Computer Science ISBN: 9783319621043
ESSoS
Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings, 10379 LNCS, 177-195
Lecture Notes in Computer Science ISBN: 9783319621043
ESSoS
Most security solutions that rely on binary rewriting assume a clean separation between code and data. Unfortunately, jump tables violate this assumption. In particular, switch statements in binary code often appear as indirect jumps with jump tables
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6570682fb18d6e097b0c91823fa5def6
https://research.vu.nl/en/publications/c722bf74-ba40-46b6-a8e7-5f16f49fd3ed
https://research.vu.nl/en/publications/c722bf74-ba40-46b6-a8e7-5f16f49fd3ed