SoK: Automated software diversity P Larsen, A Homescu, S Brunthaler, M Franz 2014 IEEE Symposium on Security and Privacy, 276-291, 2014 | 493 | 2014 |
Control-flow integrity: Precision, security, and performance N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017 | 396 | 2017 |
Readactor: Practical code randomization resilient to memory disclosure S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... 2015 IEEE Symposium on Security and Privacy, 763-780, 2015 | 333 | 2015 |
Opaque Control-Flow Integrity V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz Symposium on Network and Distributed System Security (NDSS) 2015, 0 | 248* | |
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. S Crane, A Homescu, S Brunthaler, P Larsen, M Franz NDSS, 8-11, 2015 | 208 | 2015 |
Profile-guided automated software diversity A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013 | 197 | 2013 |
Compiler-generated software diversity T Jackson, B Salamat, A Homescu, K Manivannan, G Wagner, A Gal, ... Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 77-98, 2011 | 148 | 2011 |
Librando: transparent code randomization for just-in-time compilers A Homescu, S Brunthaler, P Larsen, M Franz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 115 | 2013 |
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz WOOT 12, 64-76, 2012 | 100 | 2012 |
Booby trapping software S Crane, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013 | 77 | 2013 |
Diversifying the software stack using randomized NOP insertion T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz Moving Target Defense II: Application of Game Theory and Adversarial …, 2013 | 72 | 2013 |
Security through diversity: Are we there yet? P Larsen, S Brunthaler, M Franz IEEE Security & Privacy 12 (2), 28-35, 2013 | 66 | 2013 |
Time is on my side: Steganography in filesystem metadata S Neuner, AG Voyiatzis, M Schmiedecker, S Brunthaler, S Katzenbeisser, ... Digital Investigation 18, S76-S86, 2016 | 56 | 2016 |
Inline caching meets quickening S Brunthaler European Conference on Object-Oriented Programming, 429-451, 2010 | 53 | 2010 |
Efficient interpretation using quickening S Brunthaler ACM SIGPLAN Notices 45 (12), 1-14, 2010 | 49 | 2010 |
Large-scale automated software diversity—program evolution redux A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015 | 48 | 2015 |
Virtual-machine abstraction and optimization techniques S Brunthaler Electronic Notes in Theoretical Computer Science 253 (5), 3-14, 2009 | 35 | 2009 |
Automatic software diversity P Larsen, S Brunthaler, M Franz IEEE Security & Privacy 13 (2), 30-37, 2015 | 26 | 2015 |
Code randomization for just-in-time compilers M Franz, A Homescu, S Brunthaler, P Larsen US Patent 9,250,937, 2016 | 25 | 2016 |
Accelerating iterators in optimizing AST interpreters W Zhang, P Larsen, S Brunthaler, M Franz Proceedings of the 2014 ACM International Conference on Object Oriented …, 2014 | 21 | 2014 |