Control-flow integrity: Precision, security, and performance N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017 | 392 | 2017 |
SoK: Shining light on shadow stacks N Burow, X Zhang, M Payer 2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019 | 201 | 2019 |
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization S Dinesh, N Burow, D Xu, M Payer 2020 IEEE Symposium on Security and Privacy (SP), 128-142, 2020 | 186 | 2020 |
CFIXX: Object Type Integrity for C++ N Burow, D McKee, SA Carr, M Payer NDSS, 2018 | 67* | 2018 |
Preventing Kernel Hacks with HAKC D McKee, Y Giannaris, CO Perez, H Shrobe, M Payer, H Okhravi, ... Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022 | 52 | 2022 |
CUP: Comprehensive User-Space Protection for C/C++ N Burow, D McKee, SA Carr, M Payer AsiaCCS, 2018 | 51 | 2018 |
{FuZZan}: Efficient sanitizer metadata design for fuzzing Y Jeon, WH Han, N Burow, M Payer 2020 USENIX Annual Technical Conference (USENIX ATC 20), 249-263, 2020 | 45 | 2020 |
Keeping Safe Rust Safe with Galeed E Rivera, S Mergendahl, H Shrobe, H Okhravi, N Burow Annual Computer Security Applications Conference, 824-836, 2021 | 41 | 2021 |
Cross-Language Attacks S Mergendahl, N Burow, H Okhravi Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022 | 31 | 2022 |
TAG: Tagged Architecture Guide S Jero, N Burow, B Ward, R Skowyra, R Khazan, H Shrobe, H Okhravi ACM Computing Surveys 55 (6), 1-34, 2022 | 17 | 2022 |
Code Specialization through Dynamic Feature Observation P Biswas, N Burow, M Payer Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 15 | 2021 |
A risk assessment tool for advanced metering infrastructures T Shawly, J Liu, N Burow, S Bagchi, R Berthier, RB Bobba 2014 IEEE International Conference on Smart Grid Communications …, 2014 | 15 | 2014 |
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 14 | 2021 |
Moving Target Defense Considerations in Real-Time Safety-and Mission-Critical Systems N Burow, R Burrow, R Khazan, H Shrobe, BC Ward Proceedings of the 7th ACM Workshop on Moving Target Defense, 81-89, 2020 | 13 | 2020 |
One Giant Leap for Computer Security H Okhravi, N Burow, R Skowyra, B Ward, S Jero, R Khazan, H Shrobe IEEE Security & Privacy, 2020 | 6 | 2020 |
Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework D McKee, N Burow, M Payer arXiv preprint arXiv:1906.02928, 2019 | 3 | 2019 |
Security Considerations for Next-Generation Operating Systems for Cyber-Physical Systems BC Ward, R Skowyra, S Jero, N Burow, H Okhravi, H Shrobe, R Khazan MIT Lincoln Laboratory, 2019 | 2 | 2019 |
TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems C Nord, S Caspin, CE Nemitz, H Shrobe, H Okhravi, JH Anderson, ... 2021 IEEE Real-Time Systems Symposium (RTSS), 469-481, 2021 | 1 | 2021 |
Research Frontiers for Moving Target Defenses N Burow Proceedings of the 8th ACM Workshop on Moving Target Defense, 27-28, 2021 | | 2021 |
Analyzing Control-flow-based Glitching Attacks and Defenses C Spensky, A MacHiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ... Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021 | | 2021 |