Cfixx: Object type integrity for c++ virtual dispatch N Burow, D McKee, SA Carr, M Payer Symposium on Network and Distributed System Security (NDSS), 2018 | 64 | 2018 |
CUP: Comprehensive user-space protection for C/C++ N Burow, D McKee, SA Carr, M Payer Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 41 | 2018 |
Preventing kernel hacks with hakc D McKee, Y Giannaris, CO Perez, H Shrobe, M Payer, H Okhravi, ... Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022 | 31 | 2022 |
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts N Roessler, L Atayde, I Palmer, D McKee, J Pandey, VP Kemerlis, ... Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 16 | 2021 |
Confllvm: A compiler for enforcing data confidentiality in low-level code A Brahmakshatriya, P Kedia, DP McKee, D Garg, A Lal, A Rastogi, ... Proceedings of the Fourteenth EuroSys Conference 2019, 1-15, 2019 | 13 | 2019 |
Detecting abnormalities in IoT program executions through control-flow-based features A Agarwal, S Dawson, D McKee, P Eugster, M Tancreti, V Sundaram Proceedings of the Second International Conference on Internet-of-Things …, 2017 | 13 | 2017 |
Software ethology: An accurate and resilient semantic binary analysis framework D McKee, N Burow, M Payer arXiv preprint arXiv:1906.02928, 2019 | 5 | 2019 |
Software ethology: An accurate, resilient, and cross-architecture binary analysis framework D McKee, N Burow, M Payer arXiv preprint arXiv:1906.02928, 2019 | 3 | 2019 |
An Instrumenting Compiler for Enforcing Confidentiality in Low-Level Code A Brahmakshatriya, P Kedia, DP McKee, P Bhatu, D Garg, A Lal, ... arXiv preprint arXiv:1711.11396, 2017 | 2 | 2017 |
Novel System Compartmentalization and Reverse Engineering Methods D McKee Purdue University, 2022 | 1 | 2022 |
CFIXX: Object Type Integrity for C+ N Burow, D McKee, SA Carr, M Payer | | |
Accurate Compiler and Optimization Independent Function Identification using Program State Transformations D McKee, N Burow, M Payer | | |