关注
Lucas Vincenzo Davi
Lucas Vincenzo Davi
在 uni-due.de 的电子邮件经过验证 - 首页
标题
引用次数
年份
{ClepsydraCache}--Preventing Cache Attacks with {Time-Based} Evictions
JP Thoma, C Niesler, D Funke, G Leander, P Mayr, N Pohl, L Davi, ...
32nd USENIX Security Symposium (USENIX Security 23), 1991-2008, 2023
152023
{SGXFuzz}: Efficiently Synthesizing Nested Structures for {SGX} Enclave Fuzzing
T Cloosters, J Willbold, T Holz, L Davi
31st USENIX Security Symposium (USENIX Security 22), 3147-3164, 2022
172022
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Proceedings of the Network and Distributed System Security Symposium (NDSS’17), 2017
912017
Advanced Topics
P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz
Automated Software Diversity, 59-60, 2016
2016
Advances and throwbacks in hardware-assisted security: special session
F Brasser, L Davi, A Dhavlle, T Frassetto, SMP Dinakarrao, S Rafatirad, ...
Proceedings of the International Conference on Compilers, Architecture and …, 2018
32*2018
Attacking and Defending
P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz
Automated Software Diversity, 5-12, 2016
2016
Automated software diversity
P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz
Synthesis Lectures on Information Security, Privacy, & Trust 10 (2), 1-88, 2015
162015
Automated Software Diversity
L Davi, AR Sadeghi, M Franz
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks
AR Sadeghi, L Davi
Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014
2014
Breaking and Fixing Destructive Code Read Defenses
J Pewny, P Koppe, L Davi, T Holz
Proceedings of the 33rd Annual Computer Security Applications Conference, 55-67, 2017
132017
Building Code Randomization Defenses
L Davi, AR Sadeghi
Building Secure Defenses Against Code-Reuse Attacks, 55-67, 2015
2015
Building Control-Flow Integrity Defenses
L Davi, AR Sadeghi
Building Secure Defenses Against Code-Reuse Attacks, 27-54, 2015
62015
Building Secure Defenses Against Code-Reuse Attacks
L Davi, AR Sadeghi
Springer International Publishing, 2015
122015
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3502016
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
arXiv preprint arXiv:1611.08396, 2016
372016
Can’t touch this: Software-only mitigation against rowhammer attacks targeting kernel memory
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC …, 2017
1322017
Case Study: Compile-time Diversification
P Larsen, S Brunthaler, L Davi, AR Sadeghi, M Franz
Automated Software Diversity, 39-52, 2016
2016
CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers
T Nyman, JE Ekberg, L Davi, N Asokan
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
852017
CFI Goes Mobile: Control-Flow Integrity for Smartphones
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
International Workshop on Trustworthy Embedded Devices (TrustED), 2011
2011
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems
G Dessouky, S Zeitouni, A Ibrahim, L Davi, AR Sadeghi
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019
42019
系统目前无法执行此操作,请稍后再试。
文章 1–20