Per Larsen
Per Larsen
Verifierad e-postadress på uci.edu - Startsida
Titel
Citeras av
Citeras av
År
SoK: Automated software diversity
P Larsen, A Homescu, S Brunthaler, M Franz
2014 IEEE Symposium on Security and Privacy, 276-291, 2014
2962014
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
2292015
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
1632015
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
1432017
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1402015
Profile-guided automated software diversity
A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013
1402013
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1242015
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
S Crane, A Homescu, S Brunthaler, P Larsen, M Franz
NDSS, 8-11, 2015
1232015
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS, 2016
922016
Librando: transparent code randomization for just-in-time compilers
A Homescu, S Brunthaler, P Larsen, M Franz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
892013
Microgadgets: size does matter in turing-complete return-oriented programming
A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz
Proceedings of the 6th USENIX conference on Offensive Technologies, 7-7, 2012
582012
Booby trapping software
S Crane, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013
532013
Diversifying the software stack using randomized NOP insertion
T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz
Moving Target Defense II, 151-173, 2013
512013
Security through diversity: Are we there yet?
P Larsen, S Brunthaler, M Franz
IEEE Security & Privacy 12 (2), 28-35, 2013
462013
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 {USENIX} Annual Technical Conference ({USENIX}{ATC} 16), 167-179, 2016
362016
SoK: sanitizing for security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019
352019
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
352017
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
332016
Selfrando: Securing the tor browser against de-anonymization exploits
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proceedings on Privacy Enhancing Technologies 2016 (4), 454-469, 2016
272016
Large-scale automated software diversity—program evolution redux
A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz
IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015
262015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20