关注
Christopher Liebchen
Christopher Liebchen
Technische Universität Darmstadt
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE symposium on security and privacy, 574-588, 2013
7532013
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
5162015
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
3302015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
2532015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2152015
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1732015
{CAn’t} touch this: Software-only mitigation against rowhammer attacks targeting kernel memory
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
26th USENIX Security Symposium (USENIX Security 17), 117-130, 2017
1282017
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1272016
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
1162014
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
932017
{IMIX}:{In-Process} Memory Isolation {EXtension}
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 83-97, 2018
842018
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
L Davi, D Gens, C Liebchen, AR Sadeghi
NDSS, 2017
842017
Security analysis of mobile two-factor authentication schemes.
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
Intel Technology Journal 18 (4), 2014
642014
Selfrando: Securing the tor browser against de-anonymization exploits
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proceedings on Privacy Enhancing Technologies, 2016
622016
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
572016
Jitguard: hardening just-in-time compilers with sgx
T Frassetto, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Can't touch this: Practical and generic software-only defenses against rowhammer attacks
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
arXiv preprint arXiv:1611.08396, 2016
382016
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
302017
Rip-rh: Preventing rowhammer-based inter-process attacks
C Bock, F Brasser, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
272019
Advancing memory-corruption attacks and defenses
C Liebchen
Technische Universität, 2018
82018
系统目前无法执行此操作,请稍后再试。
文章 1–20