{ClepsydraCache}--Preventing Cache Attacks with {Time-Based} Evictions JP Thoma, C Niesler, D Funke, G Leander, P Mayr, N Pohl, L Davi, ... 32nd USENIX Security Symposium (USENIX Security 23), 1991-2008, 2023 | 15 | 2023 |
{SGXFuzz}: Efficiently Synthesizing Nested Structures for {SGX} Enclave Fuzzing T Cloosters, J Willbold, T Holz, L Davi 31st USENIX Security Symposium (USENIX Security 22), 3147-3164, 2022 | 17 | 2022 |
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ... Proceedings of the Network and Distributed System Security Symposium (NDSS’17), 2017 | 91 | 2017 |
Advanced Topics P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz Automated Software Diversity, 59-60, 2016 | | 2016 |
Advances and throwbacks in hardware-assisted security: special session F Brasser, L Davi, A Dhavlle, T Frassetto, SMP Dinakarrao, S Rafatirad, ... Proceedings of the International Conference on Compilers, Architecture and …, 2018 | 32* | 2018 |
Attacking and Defending P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz Automated Software Diversity, 5-12, 2016 | | 2016 |
Automated software diversity P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz Synthesis Lectures on Information Security, Privacy, & Trust 10 (2), 1-88, 2015 | 16 | 2015 |
Automated Software Diversity L Davi, AR Sadeghi, M Franz | | |
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks AR Sadeghi, L Davi Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014 | | 2014 |
Breaking and Fixing Destructive Code Read Defenses J Pewny, P Koppe, L Davi, T Holz Proceedings of the 33rd Annual Computer Security Applications Conference, 55-67, 2017 | 13 | 2017 |
Building Code Randomization Defenses L Davi, AR Sadeghi Building Secure Defenses Against Code-Reuse Attacks, 55-67, 2015 | | 2015 |
Building Control-Flow Integrity Defenses L Davi, AR Sadeghi Building Secure Defenses Against Code-Reuse Attacks, 27-54, 2015 | 6 | 2015 |
Building Secure Defenses Against Code-Reuse Attacks L Davi, AR Sadeghi Springer International Publishing, 2015 | 12 | 2015 |
C-FLAT: control-flow attestation for embedded systems software T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 350 | 2016 |
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi arXiv preprint arXiv:1611.08396, 2016 | 37 | 2016 |
Can’t touch this: Software-only mitigation against rowhammer attacks targeting kernel memory F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC …, 2017 | 132 | 2017 |
Case Study: Compile-time Diversification P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz Automated Software Diversity, 39-52, 2016 | | 2016 |
CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers T Nyman, JE Ekberg, L Davi, N Asokan Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 85 | 2017 |
CFI Goes Mobile: Control-Flow Integrity for Smartphones L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ... International Workshop on Trustworthy Embedded Devices (TrustED), 2011 | | 2011 |
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems G Dessouky, S Zeitouni, A Ibrahim, L Davi, AR Sadeghi 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019 | 4 | 2019 |