Stijn Volckaert
Stijn Volckaert
Assistant Professor, imec-DistriNet, KU Leuven
Zweryfikowany adres z kuleuven.be - Strona główna
Cytowane przez
Cytowane przez
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
SoK: Sanitizing for Security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
IEEE Symposium on Security and Privacy (S&P), 2019
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
D Song, F Hetzelt, D Das, C Spensky, Y Na, S Volckaert, G Vigna, ...
Network And Distributed System Security Symposium (NDSS), 2019
Secure and Efficient Application Monitoring and Replication.
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
USENIX Annual Technical Conference, 167-179, 2016
Cloning your gadgets: Complete ROP attack immunity with multi-variant execution
S Volckaert, B Coppens, B De Sutter
IEEE Transactions on Dependable and Secure Computing 13 (4), 437-450, 2016
GHUMVEE: Efficient, effective, and flexible replication
S Volckaert, B De Sutter, T De Baets, K De Bosschere
International Symposium on Foundations and Practice of Security, 261-277, 2012
Taming Parallelism in a Multi-Variant Execution Environment
S Volckaert, B Coppens, B De Sutter, K De Bosschere, P Larsen, M Franz
Proceedings of the Twelfth European Conference on Computer Systems, 270-285, 2017
DNS tunneling for network penetration
D Raman, BD Sutter, B Coppens, S Volckaert, KD Bosschere, P Danhieux, ...
International Conference on Information Security and Cryptology, 65-77, 2012
Tightly-coupled self-debugging software protection
B Abrath, B Coppens, S Volckaert, J Wijnant, B De Sutter
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
Venerable Variadic Vulnerabilities Vanquished
P Biswas, A Di Federico, SA Carr, P Rajasekaran, S Volckaert, Y Na, ...
26th USENIX Security Symposium (USENIX Security 17), 2017
BinRec: dynamic binary lifting and recompilation
A Altinay, J Nash, T Kroes, P Rajasekaran, D Zhou, A Dabrowski, D Gens, ...
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
Distributed Heterogeneous N-Variant Execution
A Voulimeneas, D Song, F Parzefall, Y Na, P Larsen, M Franz, S Volckaert
Detection of Intrusions and Malware, and Vulnerability Assessment 12223, 217, 2020
Hardware Assisted Randomization of Data
B Belleville, H Moon, J Shin, D Hwang, JM Nash, S Jung, Y Na, ...
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery
T Kroes, A Altinay, J Nash, Y Na, S Volckaert, H Bos, M Franz, C Giuffrida
Workshop on Forming an Ecosystem Around Software Transformation (FEAST), 8-13, 2018
NoJITsu: Locking Down Javascript Engines
T Park, K Dhondt, D Gens, Y Na, S Volckaert, M Franz
Symposium on Network and Distributed System Security (NDSS), 2020
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks
P Rajasekaran, S Crane, D Gens, Y Na, S Volckaert, M Franz
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
PartiSan: Fast and Flexible Sanitization via Run-time Partitioning
J Lettner, D Song, T Park, P Larsen, S Volckaert, M Franz
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization
M Qunaibit, S Brunthaler, Y Na, S Volckaert, M Franz
32nd European Conference on Object-Oriented Programming (ECOOP 2018), 2018
Advanced Techniques for Multi-Variant Execution
S Volckaert
PhD Thesis, Ghent University, Belgium, http://lib.ugent.be/catalog/rug01 …, 2015
PKRU-safe: automatically locking down the heap between safe and unsafe languages
P Kirth, M Dickerson, S Crane, P Larsen, A Dabrowski, D Gens, Y Na, ...
Proceedings of the Seventeenth European Conference on Computer Systems, 132-148, 2022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20