SoK: The challenges, pitfalls, and perils of using hardware performance counters for security S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose 2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019 | 179 | 2019 |
No-execute-after-read: Preventing code disclosure in commodity software J Werner, G Baltas, R Dallara, N Otterness, KZ Snow, F Monrose, ... Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 83 | 2016 |
Return to the zombie gadgets: Undermining destructive code reads via code inference attacks KZ Snow, R Rogowski, J Werner, H Koo, F Monrose, M Polychronakis 2016 IEEE Symposium on Security and Privacy (SP), 954-968, 2016 | 56 | 2016 |
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves J Werner, J Mason, M Antonakakis, M Polychronakis, F Monrose Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 45 | 2019 |
Integrating security modeling into embedded system design M Eby, J Werner, G Karsai, A Ledeczi 14th Annual IEEE International Conference and Workshops on the Engineering …, 2007 | 45 | 2007 |
Security risks in asynchronous web servers: When performance optimizations amplify the impact of data-oriented attacks M Morton, J Werner, P Kintis, K Snow, M Antonakakis, M Polychronakis, ... 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 167-182, 2018 | 29 | 2018 |
Model-based design of clinical information systems J Mathe, J Werner, Y Lee, B Malin, A Ledeczi Methods of Information in Medicine 47 (5), 399, 2008 | 18 | 2008 |
A fast and efficient source authentication solution for broadcasting in wireless sensor networks T Wu, Y Cui, B Kusy, A Ledeczi, J Sallai, N Skirvin, J Werner, Y Xue New Technologies, Mobility and Security, 53-63, 2007 | 17 | 2007 |
To Gamify or Not? On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention M Malone, Y Wang, K James, M Anderegg, J Werner, F Monrose Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021 | 15 | 2021 |
Methods, systems, and computer readable media for preventing code reuse attacks JJ Werner, KZ Snow, NM Otterness, RJ Dallara, G Baltas, FN Monrose, ... US Patent 10,628,589, 2020 | 13 | 2020 |
A modeling environment for patient portals S Duncavage, J Mathe, J Werner, BA Malin, A Ledeczi, J Sztipanovits AMIA Annual Symposium Proceedings 2007, 201, 2007 | 10 | 2007 |
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-) Behavior to Discover New Bugs S Das, K James, J Werner, M Antonakakis, M Polychronakis, F Monrose Annual Computer Security Applications Conference, 345-359, 2020 | 7 | 2020 |
Implementing a model-based design environment for clinical information systems J Mathe, S Duncavage, J Werner, B Malin, A Ledeczi, J Sztipanovits Sztipanovits et al.[83], 2007 | 7 | 2007 |
Platform-based design for clinical information systems J Werner, JL Mathe, S Duncavage, B Malin, A Ledeczi, JN Jirjis, ... 2007 5th IEEE International Conference on Industrial Informatics 2, 749-754, 2007 | 6 | 2007 |
Embedded systems security co-design M Eby, J Werner, G Karsai, A Ledeczi ACM SIGBED Review 4 (2), 1-4, 2007 | 5 | 2007 |
Towards the security and privacy analysis of patient portals JL Mathe, S Duncavage, J Werner, BA Malin, A Ledeczi, J Sztipanovits ACM SIGBED Review 4 (2), 5-9, 2007 | 5 | 2007 |
Tutorial: Parry and RIPOSTE: Honing Cybersecurity Skills with Challenge-Based Exercises F Monrose, J Werner 2018 IEEE Cybersecurity Development (SecDev), 132-133, 2018 | | 2018 |
MICIS-A Model-Integrated Clinical Information System J Mathe, J Werner, Y Lee, A Ledeczi, B Malin, J Sztipanovits | | 2008 |
Modeling and Simulation Tool Suite for Patient Portals J Mathe, S Duncavage, J Werner, G Karsai, A Ledeczi, B Malin, ... | | 2007 |
Integration of Clinical Workflows with Privacy Policies on a Common Semantic Platform J Werner, B Malin, Y Lee, ALJ Sztipanovits | | |