Silhouette: Efficient protected shadow stacks for embedded systems J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls 29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020 | 65 | 2020 |
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell 31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022 | 30 | 2022 |
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level Y Du, O Alrawi, K Snow, M Antonakakis, F Monrose Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level Y Du, R Court, K Snow, F Monrose 2022 USENIX Annual Technical Conference (USENIX ATC 22), 853-868, 2022 | 4 | 2022 |
Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage K James, Y Du, S Das, F Monrose 2022 IEEE 22nd International Conference on Software Quality, Reliability and …, 2022 | 3 | 2022 |
Protecting Applications on Real-time Embedded Systems from Control-flow Hijacking with Kage Y Du University of Rochester. Department of Computer Science, 2020 | | 2020 |
POSTER: Trapping Spectres in Speculation Domains I Richter, Y Du, J Criswell | | |