BibTeX records: Herbert Bos

download as .bib file

@article{DBLP:journals/pacmpl/IsemannGBKG23,
  author       = {Raphael Isemann and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe and
                  Klaus von Gleissenthall},
  title        = {Don't Look {UB:} Exposing Sanitizer-Eliding Compiler Optimizations},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{PLDI}},
  pages        = {907--927},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591257},
  doi          = {10.1145/3591257},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/IsemannGBKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GerettoHGBKG23,
  author       = {Elia Geretto and
                  Julius Hohnerlein and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe and
                  Klaus von Gleissenthall},
  title        = {Triereme: Speeding up hybrid fuzzing through efficient query scheduling},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {56--70},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627173},
  doi          = {10.1145/3627106.3627173},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GerettoHGBKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DioKBG23,
  author       = {Andrea Di Dio and
                  Koen Koning and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Copy-on-Flip: Hardening {ECC} Memory Against Rowhammer Attacks},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/copy-on-flip-hardening-ecc-memory-against-rowhammer-attacks/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/DioKBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HertoghWOMABG23,
  author       = {Math{\'{e}} Hertogh and
                  Manuel Wiesinger and
                  Sebastian {\"{O}}sterlund and
                  Marius Muench and
                  Nadav Amit and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Quarantine: Mitigating Transient Execution Attacks with Physical Domain
                  Isolation},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {207--221},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607248},
  doi          = {10.1145/3607199.3607248},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HertoghWOMABG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GorterBIKGB23,
  author       = {Floris Gorter and
                  Enrico Barberis and
                  Raphael Isemann and
                  Erik van der Kouwe and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {FloatZone: Accelerating Memory Error Detection using the Floating
                  Point Unit},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {805--822},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gorter},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GorterBIKGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoschelBDBG23,
  author       = {Jakob Koschel and
                  Pietro Borrello and
                  Daniele Cono D'Elia and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Uncontained: Uncovering Container Confusion in the Linux Kernel},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5055--5072},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/koschel},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KoschelBDBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GerettoGBK22,
  author       = {Elia Geretto and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe},
  title        = {Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {375--387},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564639},
  doi          = {10.1145/3564625.3564639},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GerettoGBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GorterKBG22,
  author       = {Floris Gorter and
                  Koen Koning and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {DangZero: Efficient Use-After-Free Detection via Direct Page Table
                  Access},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1307--1322},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560625},
  doi          = {10.1145/3548606.3560625},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GorterKBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/CostiJBGB22,
  author       = {Andreas Costi and
                  Brian Johannesmeyer and
                  Erik Bosman and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Martina Lindorfer and
                  Jason Polakis},
  title        = {On the effectiveness of same-domain memory deduplication},
  booktitle    = {EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on
                  Systems Security, Rennes, France, April 5-8, 2022},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517208.3523754},
  doi          = {10.1145/3517208.3523754},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/CostiJBGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/BacsMRGB22,
  author       = {Andrei Bacs and
                  Saidgani Musaev and
                  Kaveh Razavi and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Dean Hildebrand and
                  Donald E. Porter},
  title        = {{DUPEFS:} Leaking Data Over the Network With Filesystem Deduplication
                  Side Channels},
  booktitle    = {20th {USENIX} Conference on File and Storage Technologies, {FAST}
                  2022, Santa Clara, CA, USA, February 22-24, 2022},
  pages        = {281--296},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/fast22/presentation/bacs},
  timestamp    = {Tue, 11 Oct 2022 16:51:12 +0200},
  biburl       = {https://dblp.org/rec/conf/fast/BacsMRGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JohannesmeyerKR22,
  author       = {Brian Johannesmeyer and
                  Jakob Koschel and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Kasper: Scanning for Generalized Transient Execution Gadgets in the
                  Linux Kernel},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-247/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JohannesmeyerKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BarberisFMBG22,
  author       = {Enrico Barberis and
                  Pietro Frigo and
                  Marius Muench and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Branch History Injection: On the Effectiveness of Hardware Mitigations
                  Against Cross-Privilege Spectre-v2 Attacks},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {971--988},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/barberis},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BarberisFMBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TatarTGB22,
  author       = {Andrei Tatar and
                  Dani{\"{e}}l Trujillo and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {TLB;DR: Enhancing TLB-based Attacks with {TLB} Desynchronized Reverse
                  Engineering},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {989--1007},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/tatar},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TatarTGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/DutaGBK21,
  author       = {Victor Duta and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe},
  editor       = {Tim Sherwood and
                  Emery D. Berger and
                  Christos Kozyrakis},
  title        = {{PIBE:} practical kernel control-flow hardening with profile-guided
                  indirect branch elimination},
  booktitle    = {{ASPLOS} '21: 26th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Virtual Event,
                  USA, April 19-23, 2021},
  pages        = {743--757},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445814.3446740},
  doi          = {10.1145/3445814.3446740},
  timestamp    = {Sat, 30 Sep 2023 09:34:47 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/DutaGBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BhatKBG21,
  author       = {Koustubha Bhat and
                  Erik van der Kouwe and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {FIRestarter: Practical Software Crash Recovery with Targeted Library-level
                  Fault Injection},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {363--375},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00048},
  doi          = {10.1109/DSN48987.2021.00048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BhatKBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/OsterlundGJGGHG21,
  author       = {Sebastian {\"{O}}sterlund and
                  Elia Geretto and
                  Andrea Jemmett and
                  Emre G{\"{u}}ler and
                  Philipp G{\"{o}}rz and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {CollabFuzz: {A} Framework for Collaborative Fuzzing},
  booktitle    = {EuroSec '21: Proceedings of the 14th European Workshop on Systems
                  Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447852.3458720},
  doi          = {10.1145/3447852.3458720},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/OsterlundGJGGHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Mi0GB21,
  author       = {Xianya Mi and
                  Sanjay Rawat and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint
                  Debloating},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {62--77},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471852},
  doi          = {10.1145/3471621.3471852},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Mi0GB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RagabMRBG21,
  author       = {Hany Ragab and
                  Alyssa Milburn and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {CrossTalk: Speculative Data Leaks Across Cores Are Real},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1852--1867},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00020},
  doi          = {10.1109/SP40001.2021.00020},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RagabMRBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RidderFVBGR21,
  author       = {Finn de Ridder and
                  Pietro Frigo and
                  Emanuele Vannacci and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Kaveh Razavi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{SMASH:} Synchronized Many-sided Rowhammer Attacks from JavaScript},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1001--1018},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ridder},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RidderFVBGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RagabBBG21,
  author       = {Hany Ragab and
                  Enrico Barberis and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Rage Against the Machine Clear: {A} Systematic Analysis of Machine
                  Clears and Their Implications for Transient Execution Attacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1451--1468},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ragab},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RagabBBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KouweHABG20,
  author       = {Erik van der Kouwe and
                  Gernot Heiser and
                  Dennis Andriesse and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Benchmarking Flaws Undermine Security Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {48--57},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2969862},
  doi          = {10.1109/MSEC.2020.2969862},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KouweHABG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20,
  author       = {Emre G{\"{u}}ler and
                  Philipp G{\"{o}}rz and
                  Elia Geretto and
                  Andrea Jemmett and
                  Sebastian {\"{O}}sterlund and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Thorsten Holz},
  title        = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {360--372},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427266},
  doi          = {10.1145/3427228.3427266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoktasRPBG20,
  author       = {Enes G{\"{o}}ktas and
                  Kaveh Razavi and
                  Georgios Portokalidis and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Speculative Probing: Hacking Blind in the Spectre Era},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1871--1885},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417289},
  doi          = {10.1145/3372297.3417289},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoktasRPBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/Stamatogiannakis20,
  author       = {Manolis Stamatogiannakis and
                  Herbert Bos and
                  Paul Groth},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {PANDAcap: a framework for streamlining collection of full-system traces},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391396},
  doi          = {10.1145/3380786.3391396},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/Stamatogiannakis20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KoschelGBR20,
  author       = {Jakob Koschel and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {TagBleed: Breaking {KASLR} on the Isolated Kernel Address Space using
                  Tagged TLBs},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {309--321},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00027},
  doi          = {10.1109/EUROSP48549.2020.00027},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KoschelGBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KonothFFARB20,
  author       = {Radhesh Krishnan Konoth and
                  Bj{\"{o}}rn Fischer and
                  Wan J. Fokkink and
                  Elias Athanasopoulos and
                  Kaveh Razavi and
                  Herbert Bos},
  title        = {SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {569--586},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00043},
  doi          = {10.1109/EUROSP48549.2020.00043},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KonothFFARB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/AltinayNKRZDGNV20,
  author       = {Anil Altinay and
                  Joseph Nash and
                  Taddeus Kroes and
                  Prabhu Rajasekaran and
                  Dixin Zhou and
                  Adrian Dabrowski and
                  David Gens and
                  Yeoul Na and
                  Stijn Volckaert and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Michael Franz},
  editor       = {Angelos Bilas and
                  Kostas Magoutis and
                  Evangelos P. Markatos and
                  Dejan Kostic and
                  Margo I. Seltzer},
  title        = {BinRec: dynamic binary lifting and recompilation},
  booktitle    = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece,
                  April 27-30, 2020},
  pages        = {36:1--36:16},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3342195.3387550},
  doi          = {10.1145/3342195.3387550},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/AltinayNKRZDGNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GrasGKBR20,
  author       = {Ben Gras and
                  Cristiano Giuffrida and
                  Michael Kurth and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/absynthe-automatic-blackbox-side-channel-synthesis-on-commodity-microarchitectures/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GrasGKBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KurthGAGBR20,
  author       = {Michael Kurth and
                  Ben Gras and
                  Dennis Andriesse and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {: Practical Cache Attacks from the Network},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {20--38},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00082},
  doi          = {10.1109/SP40000.2020.00082},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KurthGAGBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FrigoVHVMGBR20,
  author       = {Pietro Frigo and
                  Emanuele Vannacci and
                  Hasan Hassan and
                  Victor van der Veen and
                  Onur Mutlu and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {TRRespass: Exploiting the Many Sides of Target Row Refresh},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {747--762},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00090},
  doi          = {10.1109/SP40000.2020.00090},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FrigoVHVMGBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OsterlundRBG20,
  author       = {Sebastian {\"{O}}sterlund and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {ParmeSan: Sanitizer-guided Greybox Fuzzing},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2289--2306},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/osterlund},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OsterlundRBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-01807,
  author       = {Pietro Frigo and
                  Emanuele Vannacci and
                  Hasan Hassan and
                  Victor van der Veen and
                  Onur Mutlu and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {TRRespass: Exploiting the Many Sides of Target Row Refresh},
  journal      = {CoRR},
  volume       = {abs/2004.01807},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.01807},
  eprinttype    = {arXiv},
  eprint       = {2004.01807},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-01807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03302,
  author       = {Andre Pawlowski and
                  Victor van der Veen and
                  Dennis Andriesse and
                  Erik van der Kouwe and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {{VPS:} Excavating High-Level {C++} Constructs from Low-Level Binaries
                  to Protect Dynamic Dispatching},
  journal      = {CoRR},
  volume       = {abs/2007.03302},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03302},
  eprinttype    = {arXiv},
  eprint       = {2007.03302},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03302.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19,
  author       = {Andre Pawlowski and
                  Victor van der Veen and
                  Dennis Andriesse and
                  Erik van der Kouwe and
                  Thorsten Holz and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {David Balenson},
  title        = {{VPS:} excavating high-level {C++} constructs from low-level binaries
                  to protect dynamic dispatching},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {97--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359797},
  doi          = {10.1145/3359789.3359797},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/BhatKBG19,
  author       = {Koustubha Bhat and
                  Erik van der Kouwe and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Iris Bahar and
                  Maurice Herlihy and
                  Emmett Witchel and
                  Alvin R. Lebeck},
  title        = {ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations},
  booktitle    = {Proceedings of the Twenty-Fourth International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2019, Providence, RI, USA, April 13-17, 2019},
  pages        = {545--558},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297858.3304073},
  doi          = {10.1145/3297858.3304073},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/BhatKBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/OsterlundKOBBG19,
  author       = {Sebastian {\"{O}}sterlund and
                  Koen Koning and
                  Pierre Olivier and
                  Antonio Barbalace and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Iris Bahar and
                  Maurice Herlihy and
                  Emmett Witchel and
                  Alvin R. Lebeck},
  title        = {kMVX: Detecting Kernel Information Leaks with Multi-variant Execution},
  booktitle    = {Proceedings of the Twenty-Fourth International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2019, Providence, RI, USA, April 13-17, 2019},
  pages        = {559--572},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297858.3304054},
  doi          = {10.1145/3297858.3304054},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/OsterlundKOBBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KouweHABG19,
  author       = {Erik van der Kouwe and
                  Gernot Heiser and
                  Dennis Andriesse and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {SoK: Benchmarking Flaws in Systems Security},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {310--325},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00031},
  doi          = {10.1109/EUROSP.2019.00031},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KouweHABG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CojocarRGB19,
  author       = {Lucian Cojocar and
                  Kaveh Razavi and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {Exploiting Correcting Codes: On the Effectiveness of {ECC} Memory
                  Against Rowhammer Attacks},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {55--71},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00089},
  doi          = {10.1109/SP.2019.00089},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CojocarRGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchaikMOFMRBG19,
  author       = {Stephan van Schaik and
                  Alyssa Milburn and
                  Sebastian {\"{O}}sterlund and
                  Pietro Frigo and
                  Giorgi Maisuradze and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {{RIDL:} Rogue In-Flight Data Load},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {88--105},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00087},
  doi          = {10.1109/SP.2019.00087},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchaikMOFMRBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10794,
  author       = {Radhesh Krishnan Konoth and
                  Rolf van Wegberg and
                  Veelasha Moonsamy and
                  Herbert Bos},
  title        = {Malicious cryptocurrency miners: Status and Outlook},
  journal      = {CoRR},
  volume       = {abs/1901.10794},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.10794},
  eprinttype    = {arXiv},
  eprint       = {1901.10794},
  timestamp    = {Sun, 03 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-10794.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KouweKOBG18,
  author       = {Erik van der Kouwe and
                  Taddeus Kroes and
                  Chris Ouwehand and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Type-After-Type: Practical and Complete Type-Safe Memory Reuse},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {17--27},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274705},
  doi          = {10.1145/3274694.3274705},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KouweKOBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jain0GB18,
  author       = {Vivek Jain and
                  Sanjay Rawat and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {{TIFF:} Using Input Type Inference To Improve Fuzzing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {505--517},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274746},
  doi          = {10.1145/3274694.3274746},
  timestamp    = {Wed, 05 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jain0GB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Goer0ABG18,
  author       = {Franck de Go{\"{e}}r and
                  Sanjay Rawat and
                  Dennis Andriesse and
                  Herbert Bos and
                  Roland Groz},
  title        = {Now You See Me: Real-time Dynamic Function Call Detection},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {618--628},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274712},
  doi          = {10.1145/3274694.3274712},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Goer0ABG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18,
  author       = {Radhesh Krishnan Konoth and
                  Emanuele Vineti and
                  Veelasha Moonsamy and
                  Martina Lindorfer and
                  Christopher Kruegel and
                  Herbert Bos and
                  Giovanni Vigna},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining
                  and Its Defense},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1714--1730},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243858},
  doi          = {10.1145/3243734.3243858},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18,
  author       = {Victor van der Veen and
                  Martina Lindorfer and
                  Yanick Fratantonio and
                  Harikrishnan Padmanabha Pillai and
                  Giovanni Vigna and
                  Christopher Kruegel and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_5},
  doi          = {10.1007/978-3-319-93411-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/GoktasKKBPHBG18,
  author       = {Enes G{\"{o}}ktas and
                  Benjamin Kollenda and
                  Philipp Koppe and
                  Erik Bosman and
                  Georgios Portokalidis and
                  Thorsten Holz and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Position-Independent Code Reuse: On the Effectiveness of {ASLR} in
                  the Absence of Information Disclosure},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {227--242},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00024},
  doi          = {10.1109/EUROSP.2018.00024},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/GoktasKKBPHBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/SchagenKBG18,
  author       = {Nathan Schagen and
                  Koen Koning and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Angelos Stavrou and
                  Konrad Rieck},
  title        = {Towards Automated Vulnerability Scanning of Network Servers},
  booktitle    = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys
                  2018, Porto, Portugal, April 23, 2018},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3193111.3193116},
  doi          = {10.1145/3193111.3193116},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/SchagenKBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/KroesKKBG18,
  author       = {Taddeus Kroes and
                  Koen Koning and
                  Erik van der Kouwe and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Rui Oliveira and
                  Pascal Felber and
                  Y. Charlie Hu},
  title        = {Delta pointers: buffer overflow checks without the checks},
  booktitle    = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto,
                  Portugal, April 23-26, 2018},
  pages        = {22:1--22:14},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190508.3190553},
  doi          = {10.1145/3190508.3190553},
  timestamp    = {Thu, 23 Jun 2022 19:57:07 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/KroesKKBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/KonothOTABGR18,
  author       = {Radhesh Krishnan Konoth and
                  Marco Oliverio and
                  Andrei Tatar and
                  Dennis Andriesse and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Kaveh Razavi},
  editor       = {Andrea C. Arpaci{-}Dusseau and
                  Geoff Voelker},
  title        = {ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer
                  Attacks},
  booktitle    = {13th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2018, Carlsbad, CA, USA, October 8-10, 2018},
  pages        = {697--710},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/osdi18/presentation/konoth},
  timestamp    = {Tue, 02 Feb 2021 08:06:02 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/KonothOTABGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/OikonomopoulosV18,
  author       = {Angelos Oikonomopoulos and
                  Remco Vermeulen and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {On the Effectiveness of Code Normalization for Function Identification},
  booktitle    = {23rd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2018, Taipei, Taiwan, December 4-7, 2018},
  pages        = {241--251},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PRDC.2018.00045},
  doi          = {10.1109/PRDC.2018.00045},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/OikonomopoulosV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TatarGBR18,
  author       = {Andrei Tatar and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Defeating Software Mitigations Against Rowhammer: {A} Surgical Precision
                  Hammer},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_3},
  doi          = {10.1007/978-3-030-00470-5\_3},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TatarGBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FrigoGBR18,
  author       = {Pietro Frigo and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  title        = {Grand Pwning Unit: Accelerating Microarchitectural Attacks with the
                  {GPU}},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {195--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00022},
  doi          = {10.1109/SP.2018.00022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FrigoGBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/TatarKAGBR18,
  author       = {Andrei Tatar and
                  Radhesh Krishnan Konoth and
                  Elias Athanasopoulos and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Throwhammer: Rowhammer Attacks over the Network and Defenses},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {213--226},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/tatar},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/TatarKAGBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SchaikGBR18,
  author       = {Stephan van Schaik and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Malicious Management Unit: Why Stopping Cache Attacks in Software
                  is Harder Than You Think},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {937--954},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/van-schaik},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SchaikGBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GrasRBG18,
  author       = {Ben Gras and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Translation Leak-aside Buffer: Defeating Cache Side-channel Protections
                  with {TLB} Attacks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {955--972},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/gras},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GrasRBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/18/GoktasABP18,
  author       = {Enes G{\"{o}}ktas and
                  Elias Athanasopoulos and
                  Herbert Bos and
                  Georgios Portokalidis},
  editor       = {Per Larsen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Evaluating control-flow restricting defenses},
  booktitle    = {The Continuing Arms Race: Code-Reuse Attacks and Defenses},
  pages        = {117--137},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2018},
  url          = {https://doi.org/10.1145/3129743.3129749},
  doi          = {10.1145/3129743.3129749},
  timestamp    = {Thu, 27 Jun 2019 20:19:31 +0200},
  biburl       = {https://dblp.org/rec/books/mc/18/GoktasABP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02381,
  author       = {Erik van der Kouwe and
                  Dennis Andriesse and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Gernot Heiser},
  title        = {Benchmarking Crimes: An Emerging Threat in Systems Security},
  journal      = {CoRR},
  volume       = {abs/1801.02381},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02381},
  eprinttype    = {arXiv},
  eprint       = {1801.02381},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/Stamatogiannakis17,
  author       = {Manolis Stamatogiannakis and
                  Elias Athanasopoulos and
                  Herbert Bos and
                  Paul Groth},
  title        = {\emph{PROV}\({}_{\mbox{2R}}\): Practical Provenance Analysis of Unstructured
                  Processes},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {17},
  number       = {4},
  pages        = {37:1--37:24},
  year         = {2017},
  url          = {https://doi.org/10.1145/3062176},
  doi          = {10.1145/3062176},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/Stamatogiannakis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeenASCBG17,
  author       = {Victor van der Veen and
                  Dennis Andriesse and
                  Manolis Stamatogiannakis and
                  Xi Chen and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1675--1689},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134026},
  doi          = {10.1145/3133956.3134026},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VeenASCBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17,
  author       = {Benjamin Kollenda and
                  Enes G{\"{o}}ktas and
                  Tim Blazytko and
                  Philipp Koppe and
                  Robert Gawlik and
                  Radhesh Krishnan Konoth and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Thorsten Holz},
  title        = {Towards Automated Discovery of Crash-Resistant Primitives in Binary
                  Executables},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {189--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.58},
  doi          = {10.1109/DSN.2017.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/CojocarKB17,
  author       = {Lucian Cojocar and
                  Taddeus Kroes and
                  Herbert Bos},
  editor       = {Eric Bodden and
                  Mathias Payer and
                  Elias Athanasopoulos},
  title        = {{JTR:} {A} Binary Solution for Switch-Case Recovery},
  booktitle    = {Engineering Secure Software and Systems - 9th International Symposium,
                  ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10379},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62105-0\_12},
  doi          = {10.1007/978-3-319-62105-0\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/CojocarKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/CojocarRB17,
  author       = {Lucian Cojocar and
                  Kaveh Razavi and
                  Herbert Bos},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Off-the-shelf Embedded Devices as Platforms for Security Research},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {1:1--1:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065919},
  doi          = {10.1145/3065913.3065919},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/CojocarRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/SchaikRGBG17,
  author       = {Stephan van Schaik and
                  Kaveh Razavi and
                  Ben Gras and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {RevAnC: {A} Framework for Reverse Engineering Hardware Page Table
                  Caches},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065918},
  doi          = {10.1145/3065913.3065918},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/SchaikRGBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KroesKGBK17,
  author       = {Taddeus Kroes and
                  Koen Koning and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe},
  editor       = {Cristiano Giuffrida and
                  Angelos Stavrou},
  title        = {Fast and Generic Metadata Management with Mid-Fat Pointers},
  booktitle    = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC}
                  2017, Belgrade, Serbia, April 23, 2017},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3065913.3065920},
  doi          = {10.1145/3065913.3065920},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/KroesKGBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AndriesseSB17,
  author       = {Dennis Andriesse and
                  Asia Slowinska and
                  Herbert Bos},
  title        = {Compiler-Agnostic Function Detection in Binaries},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {177--189},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.11},
  doi          = {10.1109/EUROSP.2017.11},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AndriesseSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChenBG17,
  author       = {Xi Chen and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {514--529},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.17},
  doi          = {10.1109/EUROSP.2017.17},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChenBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/KoningCBGA17,
  author       = {Koen Koning and
                  Xi Chen and
                  Herbert Bos and
                  Cristiano Giuffrida and
                  Elias Athanasopoulos},
  editor       = {Gustavo Alonso and
                  Ricardo Bianchini and
                  Marko Vukolic},
  title        = {No Need to Hide: Protecting Safe Regions on Commodity Hardware},
  booktitle    = {Proceedings of the Twelfth European Conference on Computer Systems,
                  EuroSys 2017, Belgrade, Serbia, April 23-26, 2017},
  pages        = {437--452},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064176.3064217},
  doi          = {10.1145/3064176.3064217},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/KoningCBGA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/RupprechtC0BLB17,
  author       = {Thomas Rupprecht and
                  Xi Chen and
                  David H. White and
                  Jan H. Boockmann and
                  Gerald L{\"{u}}ttgen and
                  Herbert Bos},
  editor       = {Grigore Rosu and
                  Massimiliano Di Penta and
                  Tien N. Nguyen},
  title        = {DSIbin: identifying dynamic data structures in {C/C++} binaries},
  booktitle    = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
                  03, 2017},
  pages        = {331--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASE.2017.8115646},
  doi          = {10.1109/ASE.2017.8115646},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/RupprechtC0BLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0001JKCGB17,
  author       = {Sanjay Rawat and
                  Vivek Jain and
                  Ashish Kumar and
                  Lucian Cojocar and
                  Cristiano Giuffrida and
                  Herbert Bos},
  title        = {VUzzer: Application-aware Evolutionary Fuzzing},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/vuzzer-application-aware-evolutionary-fuzzing/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/0001JKCGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GrasRBBG17,
  author       = {Ben Gras and
                  Kaveh Razavi and
                  Erik Bosman and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {{ASLR} on the Line: Practical Cache Attacks on the {MMU}},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/aslrcache-practical-cache-attacks-mmu/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GrasRBBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MilburnBG17,
  author       = {Alyssa Milburn and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Safelnit: Comprehensive and Practical Mitigation of Uninitialized
                  Read Vulnerabilities},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/safelnit-comprehensive-and-practical-mitigation-uninitialized-read-vulnerabilities/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MilburnBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PawlowskiCVOHBA17,
  author       = {Andre Pawlowski and
                  Moritz Contag and
                  Victor van der Veen and
                  Chris Ouwehand and
                  Thorsten Holz and
                  Herbert Bos and
                  Elias Athanasopoulos and
                  Cristiano Giuffrida},
  title        = {{MARX:} Uncovering Class Hierarchies in {C++} Programs},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/marx-uncovering-class-hierarchies-c-programs/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PawlowskiCVOHBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/OliverioRBG17,
  author       = {Marco Oliverio and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion},
  booktitle    = {Proceedings of the 26th Symposium on Operating Systems Principles,
                  Shanghai, China, October 28-31, 2017},
  pages        = {531--545},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132747.3132781},
  doi          = {10.1145/3132747.3132781},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/OliverioRBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/ChenSB16,
  author       = {Xi Chen and
                  Asia Slowinska and
                  Herbert Bos},
  title        = {On the detection of custom memory allocators in {C} binaries},
  journal      = {Empir. Softw. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {753--777},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10664-015-9362-z},
  doi          = {10.1007/S10664-015-9362-Z},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/ChenSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/HallerSB16,
  author       = {Istv{\'{a}}n Haller and
                  Asia Slowinska and
                  Herbert Bos},
  title        = {Scalable data structure detection and classification for {C/C++} binaries},
  journal      = {Empir. Softw. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {778--810},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10664-015-9363-y},
  doi          = {10.1007/S10664-015-9363-Y},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/HallerSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OikonomopoulosG16,
  author       = {Angelos Oikonomopoulos and
                  Cristiano Giuffrida and
                  Sanjay Rawat and
                  Herbert Bos},
  title        = {Binary Rejuvenation: Applications and Challenges},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {68--71},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.20},
  doi          = {10.1109/MSP.2016.20},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OikonomopoulosG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HallerJPPGBK16,
  author       = {Istv{\'{a}}n Haller and
                  Yuseok Jeon and
                  Hui Peng and
                  Mathias Payer and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Erik van der Kouwe},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {TypeSan: Practical Type Confusion Detection},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {517--528},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978405},
  doi          = {10.1145/2976749.2978405},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HallerJPPGBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeenFLGMVBRG16,
  author       = {Victor van der Veen and
                  Yanick Fratantonio and
                  Martina Lindorfer and
                  Daniel Gruss and
                  Cl{\'{e}}mentine Maurice and
                  Giovanni Vigna and
                  Herbert Bos and
                  Kaveh Razavi and
                  Cristiano Giuffrida},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Drammer: Deterministic Rowhammer Attacks on Mobile Platforms},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1675--1689},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978406},
  doi          = {10.1145/2976749.2978406},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VeenFLGMVBRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RupprechtC0MBL16,
  author       = {Thomas Rupprecht and
                  Xi Chen and
                  David H. White and
                  Jan Tobias M{\"{u}}hlberg and
                  Herbert Bos and
                  Gerald L{\"{u}}ttgen},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{POSTER:} Identifying Dynamic Data Structures in Malware},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1772--1774},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2989041},
  doi          = {10.1145/2976749.2989041},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RupprechtC0MBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/HrubyGSBT16,
  author       = {Tom{\'{a}}s Hrub{\'{y}} and
                  Cristiano Giuffrida and
                  Lionel Sambuc and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  editor       = {Athina Markopoulou and
                  Michalis Faloutsos and
                  Vyas Sekar and
                  Dejan Kostic},
  title        = {A NEaT Design for Reliable and Scalable Network Stacks},
  booktitle    = {Proceedings of the 12th International on Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA,
                  December 12-15, 2016},
  pages        = {359--373},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2999572.2999579},
  doi          = {10.1145/2999572.2999579},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/HrubyGSBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BhatVKGSTBG16,
  author       = {Koustubha Bhat and
                  Dirk Vogt and
                  Erik van der Kouwe and
                  Ben Gras and
                  Lionel Sambuc and
                  Andrew S. Tanenbaum and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {{OSIRIS:} Efficient and Consistent Recovery of Compartmentalized Operating
                  Systems},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {25--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.12},
  doi          = {10.1109/DSN.2016.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BhatVKGSTBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KoningBG16,
  author       = {Koen Koning and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Secure and Efficient Multi-Variant Execution Using Hardware-Assisted
                  Process Virtualization},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {431--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.46},
  doi          = {10.1109/DSN.2016.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KoningBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/VeggalamRHB16,
  author       = {Spandan Veggalam and
                  Sanjay Rawat and
                  Istv{\'{a}}n Haller and
                  Herbert Bos},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {581--601},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_29},
  doi          = {10.1007/978-3-319-45744-4\_29},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/VeggalamRHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/HallerKGB16,
  author       = {Istv{\'{a}}n Haller and
                  Erik van der Kouwe and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Michalis Polychronakis and
                  Cristiano Giuffrida},
  title        = {METAlloc: efficient and comprehensive metadata management for software
                  security hardening},
  booktitle    = {Proceedings of the 9th European Workshop on System Security, {EUROSEC}
                  2016, London, UK, April 18-21, 2016},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905760.2905766},
  doi          = {10.1145/2905760.2905766},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/HallerKGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KonothVB16,
  author       = {Radhesh Krishnan Konoth and
                  Victor van der Veen and
                  Herbert Bos},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_24},
  doi          = {10.1007/978-3-662-54970-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KonothVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis16,
  author       = {Manolis Stamatogiannakis and
                  Hasanat Kazmi and
                  Hashim Sharif and
                  Remco Vermeulen and
                  Ashish Gehani and
                  Herbert Bos and
                  Paul Groth},
  editor       = {Marta Mattoso and
                  Boris Glavic},
  title        = {Trade-Offs in Automatic Provenance Capture},
  booktitle    = {Provenance and Annotation of Data and Processes - 6th International
                  Provenance and Annotation Workshop, {IPAW} 2016, McLean, VA, USA,
                  June 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9672},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40593-3\_3},
  doi          = {10.1007/978-3-319-40593-3\_3},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isola/HuismanBBDGLPV16,
  author       = {Marieke Huisman and
                  Herbert Bos and
                  Sjaak Brinkkemper and
                  Arie van Deursen and
                  Jan Friso Groote and
                  Patricia Lago and
                  Jaco van de Pol and
                  Eelco Visser},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Software that Meets Its Intent},
  booktitle    = {Leveraging Applications of Formal Methods, Verification and Validation:
                  Discussion, Dissemination, Applications - 7th International Symposium,
                  ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9953},
  pages        = {609--625},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47169-3\_47},
  doi          = {10.1007/978-3-319-47169-3\_47},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isola/HuismanBBDGLPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/MiragliaVBTG16,
  author       = {Armando Miraglia and
                  Dirk Vogt and
                  Herbert Bos and
                  Andy Tanenbaum and
                  Cristiano Giuffrida},
  title        = {Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling
                  Debugging},
  booktitle    = {27th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016},
  pages        = {455--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSRE.2016.9},
  doi          = {10.1109/ISSRE.2016.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/MiragliaVBTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BacsGGB16,
  author       = {Andrei Bacs and
                  Cristiano Giuffrida and
                  Bernhard Grill and
                  Herbert Bos},
  editor       = {Sascha Ossowski},
  title        = {Slick: an intrusion detection system for virtualized storage devices},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {2033--2040},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851795},
  doi          = {10.1145/2851613.2851795},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BacsGGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VeenGCPCRBHAG16,
  author       = {Victor van der Veen and
                  Enes G{\"{o}}ktas and
                  Moritz Contag and
                  Andre Pawlowski and
                  Xi Chen and
                  Sanjay Rawat and
                  Herbert Bos and
                  Thorsten Holz and
                  Elias Athanasopoulos and
                  Cristiano Giuffrida},
  title        = {A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary
                  Level},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {934--953},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.60},
  doi          = {10.1109/SP.2016.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VeenGCPCRBHAG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BosmanRBG16,
  author       = {Erik Bosman and
                  Kaveh Razavi and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Dedup Est Machina: Memory Deduplication as an Advanced Exploitation
                  Vector},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {987--1004},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.63},
  doi          = {10.1109/SP.2016.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BosmanRBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RazaviGBPGB16,
  author       = {Kaveh Razavi and
                  Ben Gras and
                  Erik Bosman and
                  Bart Preneel and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Flip Feng Shui: Hammering a Needle in the Software Stack},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1--18},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GoktasGKAPGB16,
  author       = {Enes G{\"{o}}ktas and
                  Robert Gawlik and
                  Benjamin Kollenda and
                  Elias Athanasopoulos and
                  Georgios Portokalidis and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Undermining Information Hiding (and What to Do about It)},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {105--119},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goktas},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GoktasGKAPGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OikonomopoulosA16,
  author       = {Angelos Oikonomopoulos and
                  Elias Athanasopoulos and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Poking Holes in Information Hiding},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {121--138},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/oikonomopoulos},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OikonomopoulosA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AndriesseCVSB16,
  author       = {Dennis Andriesse and
                  Xi Chen and
                  Victor van der Veen and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {583--600},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/andriesse},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AndriesseCVSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CojocarZVBFB15,
  author       = {Lucian Cojocar and
                  Jonas Zaddach and
                  Roel Verdult and
                  Herbert Bos and
                  Aur{\'{e}}lien Francillon and
                  Davide Balzarotti},
  title        = {{PIE:} Parser Identification in Embedded Systems},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {251--260},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818035},
  doi          = {10.1145/2818000.2818035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CojocarZVBFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HallerGAPB15,
  author       = {Istv{\'{a}}n Haller and
                  Enes G{\"{o}}ktas and
                  Elias Athanasopoulos and
                  Georgios Portokalidis and
                  Herbert Bos},
  title        = {ShrinkWrap: VTable Protection without Loose Ends},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {341--350},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818025},
  doi          = {10.1145/2818000.2818025},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/HallerGAPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeenAGGSSBG15,
  author       = {Victor van der Veen and
                  Dennis Andriesse and
                  Enes G{\"{o}}ktas and
                  Ben Gras and
                  Lionel Sambuc and
                  Asia Slowinska and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Practical Context-Sensitive {CFI}},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {927--940},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813673},
  doi          = {10.1145/2810103.2813673},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VeenAGGSSBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Neugschwandtner15,
  author       = {Matthias Neugschwandtner and
                  Paolo Milani Comparetti and
                  Istv{\'{a}}n Haller and
                  Herbert Bos},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {The {BORG:} Nanoprobing Binaries for Buffer Overreads},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {87--97},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699098},
  doi          = {10.1145/2699026.2699098},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Neugschwandtner15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GrillBPB15,
  author       = {Bernhard Grill and
                  Andrei Bacs and
                  Christian Platzer and
                  Herbert Bos},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {"Nice Boots!" - {A} Large-Scale Analysis of Bootkits and
                  New Ways to Stop Them},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {25--45},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_2},
  doi          = {10.1007/978-3-319-20550-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/GrillBPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AndriesseBS15,
  author       = {Dennis Andriesse and
                  Herbert Bos and
                  Asia Slowinska},
  title        = {Parallax: Implicit Code Integrity Verification Using Return-Oriented
                  Programming},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {125--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.12},
  doi          = {10.1109/DSN.2015.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/AndriesseBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/VogtGBT15,
  author       = {Dirk Vogt and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  title        = {Lightweight Memory Checkpointing},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {474--484},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.45},
  doi          = {10.1109/DSN.2015.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/VogtGBT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/AndriesseRB15,
  author       = {Dennis Andriesse and
                  Christian Rossow and
                  Herbert Bos},
  editor       = {Kenjiro Cho and
                  Kensuke Fukuda and
                  Vivek S. Pai and
                  Neil Spring},
  title        = {Reliable Recon in Adversarial Peer-to-Peer Botnets},
  booktitle    = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC}
                  2015, Tokyo, Japan, October 28-30, 2015},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2815675.2815682},
  doi          = {10.1145/2815675.2815682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/AndriesseRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/VogtMPBTG15,
  author       = {Dirk Vogt and
                  Armando Miraglia and
                  Georgios Portokalidis and
                  Herbert Bos and
                  Andy Tanenbaum and
                  Cristiano Giuffrida},
  editor       = {Rodger Lea and
                  Sathish Gopalakrishnan and
                  Eli Tilevich and
                  Amy L. Murphy and
                  Michael Blackstock},
  title        = {Speculative Memory Checkpointing},
  booktitle    = {Proceedings of the 16th Annual Middleware Conference, Vancouver, BC,
                  Canada, December 07 - 11, 2015},
  pages        = {197--209},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814576.2814802},
  doi          = {10.1145/2814576.2814802},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/VogtMPBTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenSABG15,
  author       = {Xi Chen and
                  Asia Slowinska and
                  Dennis Andriesse and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {StackArmor: Comprehensive Protection From Stack-based Memory Error
                  Vulnerabilities for Binaries},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/stackarmor-comprehensive-protection-stack-based-memory-error-vulnerabilities-binaries},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenSABG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapp/Stamatogiannakis15,
  author       = {Manolis Stamatogiannakis and
                  Paul Groth and
                  Herbert Bos},
  editor       = {Paolo Missier and
                  Jun Zhao},
  title        = {Decoupling Provenance Capture and Analysis from Execution},
  booktitle    = {7th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP
                  2015, Edinburgh, Scotland, UK, July 8-9, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/tapp15/workshop-program/presentation/stamatogiannakis},
  timestamp    = {Tue, 02 Feb 2021 08:04:55 +0100},
  biburl       = {https://dblp.org/rec/conf/tapp/Stamatogiannakis15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2015,
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5},
  doi          = {10.1007/978-3-319-26362-5},
  isbn         = {978-3-319-26361-8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/VogtGBT14,
  author       = {Dirk Vogt and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  title        = {Techniques for efficient in-memory checkpointing},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {48},
  number       = {1},
  pages        = {21--25},
  year         = {2014},
  url          = {https://doi.org/10.1145/2626401.2626406},
  doi          = {10.1145/2626401.2626406},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/VogtGBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/SlowinskaHBBB14,
  author       = {Asia Slowinska and
                  Istv{\'{a}}n Haller and
                  Andrei Bacs and
                  Silviu Baranga and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {Data Structure Archaeology: Scrape Away the Dirt and Glue Back the
                  Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_1},
  doi          = {10.1007/978-3-319-08509-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/SlowinskaHBBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/AndriesseB14,
  author       = {Dennis Andriesse and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {Instruction-Level Steganography for Covert Trigger-Based Malware -
                  (Extended Abstract)},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_3},
  doi          = {10.1007/978-3-319-08509-8\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/AndriesseB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14,
  author       = {Cristiano Giuffrida and
                  Kamil Majdanik and
                  Mauro Conti and
                  Herbert Bos},
  editor       = {Sven Dietrich},
  title        = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced
                  Keystroke Dynamics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_6},
  doi          = {10.1007/978-3-319-08509-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/GiuffridaMCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/WelzelRB14,
  author       = {Arne Welzel and
                  Christian Rossow and
                  Herbert Bos},
  editor       = {Davide Balzarotti and
                  Juan Caballero},
  title        = {On measuring the impact of DDoS botnets},
  booktitle    = {Proceedings of the Seventh European Workshop on System Security, EuroSec
                  2014, April 13, 2014, Amsterdam, The Netherlands},
  pages        = {3:1--3:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2592791.2592794},
  doi          = {10.1145/2592791.2592794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/WelzelRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis14,
  author       = {Manolis Stamatogiannakis and
                  Paul Groth and
                  Herbert Bos},
  editor       = {Bertram Lud{\"{a}}scher and
                  Beth Plale},
  title        = {Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic
                  Instrumentation},
  booktitle    = {Provenance and Annotation of Data and Processes - 5th International
                  Provenance and Annotation Workshop, {IPAW} 2014, Cologne, Germany,
                  June 9-13, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8628},
  pages        = {155--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16462-5\_12},
  doi          = {10.1007/978-3-319-16462-5\_12},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/HrubyCBT14,
  author       = {Tom{\'{a}}s Hrub{\'{y}} and
                  Teodor Crivat and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  editor       = {Ken Birman},
  title        = {On Sockets and System Calls: Minimizing Context Switches for the Socket
                  {API}},
  booktitle    = {2014 Conference on Timely Results in Operating Systems, {TRIOS} '14,
                  Broomfield, CO, USA, October 5, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/trios14/technical-sessions/presentation/hruby},
  timestamp    = {Tue, 02 Feb 2021 08:06:00 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/HrubyCBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BosmanB14,
  author       = {Erik Bosman and
                  Herbert Bos},
  title        = {Framing Signals - {A} Return to Portable Shellcode},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {243--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.23},
  doi          = {10.1109/SP.2014.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BosmanB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GoktasABP14,
  author       = {Enes G{\"{o}}ktas and
                  Elias Athanasopoulos and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Out of Control: Overcoming Control-Flow Integrity},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {575--589},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.43},
  doi          = {10.1109/SP.2014.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GoktasABP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/StamatogiannakisGB14,
  author       = {Manolis Stamatogiannakis and
                  Paul Groth and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Facilitating Trust on Data through Provenance},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {220--221},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_21},
  doi          = {10.1007/978-3-319-08593-7\_21},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/StamatogiannakisGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GoktasAPBP14,
  author       = {Enes G{\"{o}}ktas and
                  Elias Athanasopoulos and
                  Michalis Polychronakis and
                  Herbert Bos and
                  Georgios Portokalidis},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse
                  Attacks is Hard},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {417--432},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/goktas},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GoktasAPBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2014,
  editor       = {Dick C. A. Bulterman and
                  Herbert Bos and
                  Antony I. T. Rowstron and
                  Peter Druschel},
  title        = {Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands,
                  April 13-16, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2592798},
  isbn         = {978-1-4503-2704-6},
  timestamp    = {Fri, 13 Jun 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2014,
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1},
  doi          = {10.1007/978-3-319-11379-1},
  isbn         = {978-3-319-11378-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/HallerSNB13,
  author       = {Istv{\'{a}}n Haller and
                  Asia Slowinska and
                  Matthias Neugschwandtner and
                  Herbert Bos},
  title        = {Dowser: {A} Guided Fuzzer for Finding Buffer Overflow Vulnerabilities},
  journal      = {login Usenix Mag.},
  volume       = {38},
  number       = {6},
  year         = {2013},
  url          = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/dowser-guided-fuzzer-finding-buffer-overflow},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/HallerSNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotdep/VogtGBT13,
  author       = {Dirk Vogt and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  editor       = {Christian Cachin and
                  Robbert van Renesse},
  title        = {Techniques for efficient in-memory checkpointing},
  booktitle    = {Proceedings of the 9th Workshop on Hot Topics in Dependable Systems,
                  HotDep 2013, Farmington, Pennsylvania, USA, November 3, 2013},
  pages        = {12:1--12:5},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2524224.2524236},
  doi          = {10.1145/2524224.2524236},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotdep/VogtGBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/AndriesseRSPB13,
  author       = {Dennis Andriesse and
                  Christian Rossow and
                  Brett Stone{-}Gross and
                  Daniel Plohmann and
                  Herbert Bos},
  title        = {Highly resilient peer-to-peer botnets are here: An analysis of Gameover
                  Zeus},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {116--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703693},
  doi          = {10.1109/MALWARE.2013.6703693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/AndriesseRSPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowAWSPDB13,
  author       = {Christian Rossow and
                  Dennis Andriesse and
                  Tillmann Werner and
                  Brett Stone{-}Gross and
                  Daniel Plohmann and
                  Christian J. Dietrich and
                  Herbert Bos},
  title        = {SoK: {P2PWNED} - Modeling and Evaluating the Resilience of Peer-to-Peer
                  Botnets},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {97--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.17},
  doi          = {10.1109/SP.2013.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RossowAWSPDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/HrubyBT13,
  author       = {Tom{\'{a}}s Hrub{\'{y}} and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  editor       = {Andrew Birrell and
                  Emin G{\"{u}}n Sirer},
  title        = {When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems},
  booktitle    = {2013 {USENIX} Annual Technical Conference, San Jose, CA, USA, June
                  26-28, 2013},
  pages        = {255--266},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/atc13/technical-sessions/presentation/hruby},
  timestamp    = {Mon, 01 Feb 2021 08:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/HrubyBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HallerSNB13,
  author       = {Istv{\'{a}}n Haller and
                  Asia Slowinska and
                  Matthias Neugschwandtner and
                  Herbert Bos},
  editor       = {Samuel T. King},
  title        = {Dowsing for Overflows: {A} Guided Fuzzer to Find Buffer Boundary Violations},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {49--64},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/papers/haller},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HallerSNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/ChenSB13,
  author       = {Xi Chen and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {Who allocated my memory? Detecting custom memory allocators in {C}
                  binaries},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {22--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671277},
  doi          = {10.1109/WCRE.2013.6671277},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/ChenSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HallerSB13,
  author       = {Istv{\'{a}}n Haller and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {MemPick: High-level data structure detection in {C/C++} binaries},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {32--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671278},
  doi          = {10.1109/WCRE.2013.6671278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HallerSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/ChenSB13a,
  author       = {Xi Chen and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {MemBrush: {A} practical tool to detect custom memory allocators in
                  {C} binaries},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {477--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671326},
  doi          = {10.1109/WCRE.2013.6671326},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/ChenSB13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HallerSB13a,
  author       = {Istv{\'{a}}n Haller and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Ralf L{\"{a}}mmel and
                  Rocco Oliveto and
                  Romain Robbes},
  title        = {MemPick: {A} tool for data structure detection},
  booktitle    = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz,
                  Germany, October 14-17, 2013},
  pages        = {479--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCRE.2013.6671327},
  doi          = {10.1109/WCRE.2013.6671327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HallerSB13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RossowDB12,
  author       = {Christian Rossow and
                  Christian J. Dietrich and
                  Herbert Bos},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {Large-Scale Analysis of Malware Downloaders},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_3},
  doi          = {10.1007/978-3-642-37300-8\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/RossowDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BacsVSB12,
  author       = {Andrei Bacs and
                  Remco Vermeulen and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Ulrich Flegel and
                  Evangelos P. Markatos and
                  William K. Robertson},
  title        = {System-Level Support for Intrusion Recovery},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece,
                  July 26-27, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7591},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37300-8\_9},
  doi          = {10.1007/978-3-642-37300-8\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/BacsVSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HrubyVBT12,
  author       = {Tom{\'{a}}s Hrub{\'{y}} and
                  Dirk Vogt and
                  Herbert Bos and
                  Andrew S. Tanenbaum},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {Keep net working - on a dependable and fast networking stack},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263933},
  doi          = {10.1109/DSN.2012.6263933},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HrubyVBT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VeendCB12,
  author       = {Victor van der Veen and
                  Nitish dutt{-}Sharma and
                  Lorenzo Cavallaro and
                  Herbert Bos},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Memory Errors: The Past, the Present, and the Future},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {86--106},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_5},
  doi          = {10.1007/978-3-642-33338-5\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VeendCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12,
  author       = {Christian Rossow and
                  Christian J. Dietrich and
                  Chris Grier and
                  Christian Kreibich and
                  Vern Paxson and
                  Norbert Pohlmann and
                  Herbert Bos and
                  Maarten van Steen},
  title        = {Prudent Practices for Designing Malware Experiments: Status Quo and
                  Outlook},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {65--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.14},
  doi          = {10.1109/SP.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RossowDGKPPBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/SlowinskiSB12,
  author       = {Asia Slowinska and
                  Traian Stancescu and
                  Herbert Bos},
  editor       = {Gernot Heiser and
                  Wilson C. Hsieh},
  title        = {Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation},
  booktitle    = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15,
                  2012},
  pages        = {125--137},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/slowinska},
  timestamp    = {Mon, 01 Feb 2021 08:43:32 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/SlowinskiSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2012,
  editor       = {Pascal Felber and
                  Frank Bellosa and
                  Herbert Bos},
  title        = {European Conference on Computer Systems, Proceedings of the Seventh
                  EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13,
                  2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2168836},
  isbn         = {978-1-4503-1223-3},
  timestamp    = {Thu, 19 Apr 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/MarkatosB12,
  author       = {Evangelos P. Markatos and
                  Herbert Bos},
  title        = {SysSec: Managing Threats and Vulnerabilities in the Future Internet},
  journal      = {{ERCIM} News},
  volume       = {2012},
  number       = {90},
  year         = {2012},
  url          = {http://ercim-news.ercim.eu/en90/special/syssec-managing-threats-and-vulnerabilities-in-the-future-internet},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/MarkatosB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BruijnBB11,
  author       = {Willem de Bruijn and
                  Herbert Bos and
                  Henri E. Bal},
  title        = {Application-Tailored {I/O} with Streamline},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {6:1--6:33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1963559.1963562},
  doi          = {10.1145/1963559.1963562},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocs/BruijnBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/RossowDBCSFP11,
  author       = {Christian Rossow and
                  Christian J. Dietrich and
                  Herbert Bos and
                  Lorenzo Cavallaro and
                  Maarten van Steen and
                  Felix C. Freiling and
                  Norbert Pohlmann},
  editor       = {Engin Kirda and
                  Thorsten Holz},
  title        = {Sandnet: network traffic analysis of malicious software},
  booktitle    = {Proceedings of the First Workshop on Building Analysis Datasets and
                  Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg,
                  Austria, April 10, 2011},
  pages        = {78--88},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978672.1978682},
  doi          = {10.1145/1978672.1978682},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/badgers/RossowDBCSFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BosCT11,
  author       = {Herbert Bos and
                  Lorenzo Cavallaro and
                  Andrew S. Tanenbaum},
  title        = {Systems Security at {VU} University Amsterdam},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {111--114},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.26},
  doi          = {10.1109/SYSSEC.2011.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/BosCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ec2nd/DietrichRFBSP11,
  author       = {Christian J. Dietrich and
                  Christian Rossow and
                  Felix C. Freiling and
                  Herbert Bos and
                  Maarten van Steen and
                  Norbert Pohlmann},
  title        = {On Botnets That Use {DNS} for Command and Control},
  booktitle    = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011,
                  Gothenburg, Sweden, September 6-7, 2011},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/EC2ND.2011.16},
  doi          = {10.1109/EC2ND.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ec2nd/DietrichRFBSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SlowinskaSB11,
  author       = {Asia Slowinska and
                  Traian Stancescu and
                  Herbert Bos},
  title        = {Howard: {A} Dynamic Excavator for Reverse Engineering Data Structures},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/howard-a-dynamic-excavator-for-reverse-engineering-data-structures},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SlowinskaSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BosmanSB11,
  author       = {Erik Bosman and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Minemu: The World's Fastest Taint Tracker},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_1},
  doi          = {10.1007/978-3-642-23644-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BosmanSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2011,
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9},
  doi          = {10.1007/978-3-642-22424-9},
  isbn         = {978-3-642-22423-2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/SlowinskaB10,
  author       = {Asia Slowinska and
                  Herbert Bos},
  title        = {Pointer tainting still pointless: (but we all see the point of tainting)},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {44},
  number       = {3},
  pages        = {88--92},
  year         = {2010},
  url          = {https://doi.org/10.1145/1842733.1842748},
  doi          = {10.1145/1842733.1842748},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/SlowinskaB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/TanenbaumABCGHH10,
  author       = {Andrew S. Tanenbaum and
                  Raja Appuswamy and
                  Herbert Bos and
                  Lorenzo Cavallaro and
                  Cristiano Giuffrida and
                  Tom{\'{a}}s Hrub{\'{y}} and
                  Jorrit N. Herder and
                  Erik van der Kouwe and
                  David C. van Moolenbroek},
  title        = {{MINIX} 3: Status Report and Current Research},
  journal      = {login Usenix Mag.},
  volume       = {35},
  number       = {3},
  year         = {2010},
  url          = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/minix-3-status-report-and-current-research},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/TanenbaumABCGHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PortokalidisHAB10,
  author       = {Georgios Portokalidis and
                  Philip Homburg and
                  Kostas Anagnostakis and
                  Herbert Bos},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Paranoid Android: versatile protection for smartphones},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {347--356},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920313},
  doi          = {10.1145/1920261.1920313},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PortokalidisHAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/VijzelaarBF10,
  author       = {Stefan Vijzelaar and
                  Herbert Bos and
                  Wan J. Fokkink},
  editor       = {Andr{\'{e}}a W. Richa and
                  Rachid Guerraoui},
  title        = {Brief announcement: a shared disk on distributed storage},
  booktitle    = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010},
  pages        = {79--80},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835698.1835718},
  doi          = {10.1145/1835698.1835718},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/VijzelaarBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SlowinskaSB10,
  author       = {Asia Slowinska and
                  Traian Stancescu and
                  Herbert Bos},
  editor       = {Chandramohan A. Thekkath and
                  Ramakrishna Kotla and
                  Lidong Zhou},
  title        = {{DDE:} dynamic data structure excavation},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} Asia-Pacific Workshop on Systems,
                  ApSys 2010, New Delhi, India, August 30, 2010},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1851276.1851280},
  doi          = {10.1145/1851276.1851280},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SlowinskaSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HerderBGHT09,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Fault isolation for device drivers},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270357},
  doi          = {10.1109/DSN.2009.5270357},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HerderBGHT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/SlowinskaB09,
  author       = {Asia Slowinska and
                  Herbert Bos},
  editor       = {Wolfgang Schr{\"{o}}der{-}Preikschat and
                  John Wilkes and
                  Rebecca Isaacs},
  title        = {Pointless tainting?: evaluating the practicality of pointer tainting},
  booktitle    = {Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April
                  1-3, 2009},
  pages        = {61--74},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519065.1519073},
  doi          = {10.1145/1519065.1519073},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/SlowinskaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/NijhuisBBA09,
  author       = {Maik Nijhuis and
                  Herbert Bos and
                  Henri E. Bal and
                  C{\'{e}}dric Augonnet},
  editor       = {Andr{\'{e}} Seznec and
                  Joel S. Emer and
                  Michael F. P. O'Boyle and
                  Margaret Martonosi and
                  Theo Ungerer},
  title        = {Mapping and Synchronizing Streaming Applications on Cell Processors},
  booktitle    = {High Performance Embedded Architectures and Compilers, Fourth International
                  Conference, HiPEAC 2009, Paphos, Cyprus, January 25-28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5409},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-540-92990-1\_17},
  doi          = {10.1007/978-3-540-92990-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/NijhuisBBA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/BosSCA08,
  author       = {Herbert Bos and
                  Bart Samwel and
                  Mihai{-}Lucian Cristea and
                  Kostas Anagnostakis},
  title        = {Safe execution of untrusted applications on embedded network processors},
  journal      = {Int. J. Embed. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {294--303},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJES.2008.022399},
  doi          = {10.1504/IJES.2008.022399},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/BosSCA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BruijnB08,
  author       = {Willem de Bruijn and
                  Herbert Bos},
  title        = {PipesFS: fast Linux {I/O} in the unix tradition},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {42},
  number       = {5},
  pages        = {55--63},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400097.1400104},
  doi          = {10.1145/1400097.1400104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BruijnB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/PortokalidisB08,
  author       = {Georgios Portokalidis and
                  Herbert Bos},
  editor       = {Joseph S. Sventek and
                  Steven Hand},
  title        = {Eudaemon: involuntary and on-demand emulation against zero-day exploits},
  booktitle    = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK,
                  April 1-4, 2008},
  pages        = {287--299},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352592.1352622},
  doi          = {10.1145/1352592.1352622},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/PortokalidisB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BruijnB08,
  author       = {Willem de Bruijn and
                  Herbert Bos},
  title        = {Beltway Buffers: Avoiding the {OS} Traffic Jam},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {136--140},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.36},
  doi          = {10.1109/INFOCOM.2008.36},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/BruijnB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/HerderBGHT08,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Countering {IPC} Threats in Multiserver Operating Systems {(A} Fundamental
                  Requirement for Dependability)},
  booktitle    = {14th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2008, 15-17 December 2008, Taipei, Taiwan},
  pages        = {112--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PRDC.2008.25},
  doi          = {10.1109/PRDC.2008.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/HerderBGHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosec/2008,
  editor       = {Herbert Bos and
                  Evangelos P. Markatos},
  title        = {Proceedings of the First European Workshop on System Security, {EUROSEC}
                  2008, Glasgow, Scotland, UK, March 31, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-119-4},
  timestamp    = {Tue, 13 Apr 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PortokalidisB07,
  author       = {Georgios Portokalidis and
                  Herbert Bos},
  title        = {SweetBait: Zero-hour worm detection and containment using low- and
                  high-interaction honeypots},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {5},
  pages        = {1256--1274},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2006.09.005},
  doi          = {10.1016/J.COMNET.2006.09.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PortokalidisB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/HerderBGHT07,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Roadmap to a Failure-Resilient Operating System},
  journal      = {login Usenix Mag.},
  volume       = {32},
  number       = {1},
  year         = {2007},
  url          = {https://www.usenix.org/publications/login/february-2007-volume-32-number-1/roadmap-failure-resilient-operating-system},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/HerderBGHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SlowinskaB07,
  author       = {Asia Slowinska and
                  Herbert Bos},
  title        = {The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows
                  on Heap or Stack},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {487--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.32},
  doi          = {10.1109/ACSAC.2007.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SlowinskaB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/HrubyRB07,
  author       = {Tom{\'{a}}s Hrub{\'{y}} and
                  Kees van Reeuwijk and
                  Herbert Bos},
  editor       = {Raj Yavatkar and
                  Dirk Grunwald and
                  K. K. Ramakrishnan},
  title        = {Ruler: high-speed packet matching and rewriting on NPUs},
  booktitle    = {Proceedings of the 2007 {ACM/IEEE} Symposium on Architecture for Networking
                  and Communications Systems, {ANCS} 2007, Orlando, Florida, USA, December
                  3-4, 2007},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1323548.1323550},
  doi          = {10.1145/1323548.1323550},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ancs/HrubyRB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HerderBGHT07,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Failure Resilience for Device Drivers},
  booktitle    = {The 37th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK,
                  Proceedings},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DSN.2007.46},
  doi          = {10.1109/DSN.2007.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HerderBGHT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/NijhuisBB07,
  author       = {Maik Nijhuis and
                  Herbert Bos and
                  Henri E. Bal},
  title        = {A Component-based Coordination Language for Efficient Reconfigurable
                  Streaming Applications},
  booktitle    = {2007 International Conference on Parallel Processing {(ICPP} 2007),
                  September 10-14, 2007, Xi-An, China},
  pages        = {60},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICPP.2007.5},
  doi          = {10.1109/ICPP.2007.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpp/NijhuisBB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/CristeaGXB07,
  author       = {Mihai{-}Lucian Cristea and
                  Leon Gommans and
                  Li Xu and
                  Herbert Bos},
  editor       = {Ian F. Akyildiz and
                  Raghupathy Sivakumar and
                  Eylem Ekici and
                  Jaudelice Cavalcante de Oliveira and
                  Janise McNair},
  title        = {The Token Based Switch: Per-Packet Access Authorisation to Optical
                  Shortcuts},
  booktitle    = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks,
                  Next Generation Internet, 6th International {IFIP-TC6} Networking
                  Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4479},
  pages        = {945--957},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72606-7\_81},
  doi          = {10.1007/978-3-540-72606-7\_81},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/CristeaGXB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BosSB06,
  author       = {Herbert Bos and
                  Bart Samwel and
                  Ilja Booij},
  title        = {Dynamically extending the Corral with native code for high-speed packet
                  processing},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {14},
  pages        = {2444--2461},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2006.04.019},
  doi          = {10.1016/J.COMNET.2006.04.019},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BosSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TanenbaumHB06,
  author       = {Andrew S. Tanenbaum and
                  Jorrit N. Herder and
                  Herbert Bos},
  title        = {Can We Make Operating Systems Reliable and Secure?},
  journal      = {Computer},
  volume       = {39},
  number       = {5},
  pages        = {44--51},
  year         = {2006},
  url          = {https://doi.org/10.1109/MC.2006.156},
  doi          = {10.1109/MC.2006.156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TanenbaumHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/TanenbaumHB06,
  author       = {Andrew S. Tanenbaum and
                  Jorrit N. Herder and
                  Herbert Bos},
  title        = {File size distribution on {UNIX} systems: then and now},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {40},
  number       = {1},
  pages        = {100--104},
  year         = {2006},
  url          = {https://doi.org/10.1145/1113361.1113364},
  doi          = {10.1145/1113361.1113364},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/TanenbaumHB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HerderBGHT06,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {{MINIX} 3: a highly reliable, self-repairing operating system},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {40},
  number       = {3},
  pages        = {80--89},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151374.1151391},
  doi          = {10.1145/1151374.1151391},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/HerderBGHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/HerderBGHT06,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Modular System Programming in {MINIX} 3},
  journal      = {login Usenix Mag.},
  volume       = {31},
  number       = {2},
  year         = {2006},
  url          = {https://www.usenix.org/publications/login/april-2006-volume-31-number-2/modular-system-programming-minix-3},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/HerderBGHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aPcsac/HerderBGHT06,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  editor       = {Chris R. Jesshope and
                  Colin Egan},
  title        = {Reorganizing {UNIX} for Reliability},
  booktitle    = {Advances in Computer Systems Architecture, 11th Asia-Pacific Conference,
                  {ACSAC} 2006, Shanghai, China, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4186},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11859802\_8},
  doi          = {10.1007/11859802\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/aPcsac/HerderBGHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/HerderBGHT06,
  author       = {Jorrit N. Herder and
                  Herbert Bos and
                  Ben Gras and
                  Philip Homburg and
                  Andrew S. Tanenbaum},
  title        = {Construction of a Highly Dependable Operating System},
  booktitle    = {Sixth European Dependable Computing Conference, {EDCC} 2006, Coimbra,
                  Portugal, 18-20 October 2006},
  pages        = {3--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDCC.2006.7},
  doi          = {10.1109/EDCC.2006.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/HerderBGHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/NijhuisBB06,
  author       = {Maik Nijhuis and
                  Herbert Bos and
                  Henri E. Bal},
  editor       = {Wolfgang E. Nagel and
                  Wolfgang V. Walter and
                  Wolfgang Lehner},
  title        = {Supporting Reconfigurable Parallel Multimedia Applications},
  booktitle    = {Euro-Par 2006, Parallel Processing, 12th International Euro-Par Conference,
                  Dresden, Germany, August 28 - September 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4128},
  pages        = {765--776},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11823285\_80},
  doi          = {10.1007/11823285\_80},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/NijhuisBB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06,
  author       = {Georgios Portokalidis and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Yolande Berbers and
                  Willy Zwaenepoel},
  title        = {Argos: an emulator for fingerprinting zero-day attacks for advertised
                  honeypots with automatic signature generation},
  booktitle    = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April
                  18-21, 2006},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1217935.1217938},
  doi          = {10.1145/1217935.1217938},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/PortokalidisSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcpc/VarbanescuNGSBB06,
  author       = {Ana Lucia Varbanescu and
                  Maik Nijhuis and
                  Arturo Gonz{\'{a}}lez{-}Escribano and
                  Henk J. Sips and
                  Herbert Bos and
                  Henri E. Bal},
  editor       = {George Alm{\'{a}}si and
                  Calin Cascaval and
                  Peng Wu},
  title        = {SP@CE - An SP-Based Programming Model for Consumer Electronics Streaming
                  Applications},
  booktitle    = {Languages and Compilers for Parallel Computing, 19th International
                  Workshop, {LCPC} 2006, New Orleans, LA, USA, November 2-4, 2006. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4382},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-72521-3\_4},
  doi          = {10.1007/978-3-540-72521-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/lcpc/VarbanescuNGSBB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BruijnSRHXB06,
  author       = {Willem de Bruijn and
                  Asia Slowinska and
                  Kees van Reeuwijk and
                  Tom{\'{a}}s Hrub{\'{y}} and
                  Li Xu and
                  Herbert Bos},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {SafeCard: {A} Gigabit {IPS} on the Network Card},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {311--330},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_16},
  doi          = {10.1007/11856214\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BruijnSRHXB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/CristeaBB05,
  author       = {Mihai{-}Lucian Cristea and
                  Willem de Bruijn and
                  Herbert Bos},
  editor       = {Raouf Boutaba and
                  Kevin C. Almeroth and
                  Ram{\'{o}}n Puigjaner and
                  Sherman X. Shen and
                  James P. Black},
  title        = {{FPL-3:} Towards Language Support for Distributed Packet Processing},
  booktitle    = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols;
                  Performance of Computer and Communication Networks; Mobile and Wireless
                  Communication Systems, 4th International {IFIP-TC6} Networking Conference,
                  Waterloo, Canada, May 2-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3462},
  pages        = {743--755},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11422778\_60},
  doi          = {10.1007/11422778\_60},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/CristeaBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BosH05,
  author       = {Herbert Bos and
                  Kaiming Huang},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Towards Software-Based Signature Detection for Intrusion Prevention
                  on the Network Card},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {102--123},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_6},
  doi          = {10.1007/11663812\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BosH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/CristeaZDB05,
  author       = {Mihai{-}Lucian Cristea and
                  Claudiu Zissulescu and
                  Ed F. Deprettere and
                  Herbert Bos},
  editor       = {Timo D. H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Andy D. Pimentel and
                  Jarmo Takala and
                  Stamatis Vassiliadis},
  title        = {{FPL-3E:} Towards Language Support for Reconfigurable Packet Processing},
  booktitle    = {Embedded Computer Systems: Architectures, Modeling, and Simulation
                  5th International Workshop, {SAMOS} 2005, Samos, Greece, July 18-20,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3553},
  pages        = {82--92},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11512622\_10},
  doi          = {10.1007/11512622\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/CristeaZDB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/BruijnBB05,
  author       = {Willem de Bruijn and
                  Herbert Bos and
                  Henri E. Bal},
  title        = {Robust Distributed Systems Achieving Self-Management through Inference},
  booktitle    = {2005 International Conference on a World of Wireless, Mobile and Multimedia
                  Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings},
  pages        = {542--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WOWMOM.2005.90},
  doi          = {10.1109/WOWMOM.2005.90},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wowmom/BruijnBB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/BruijnMB04,
  author       = {Willem de Bruijn and
                  Jon T. Moore and
                  Herbert Bos},
  title        = {Splash: {SNMP} Plus a Lightweight {API} for {SNAP} Handling},
  booktitle    = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP}
                  Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea,
                  19-23 April 2004, Proceedings},
  pages        = {743--756},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/NOMS.2004.1317761},
  doi          = {10.1109/NOMS.2004.1317761},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/BruijnMB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/BosBCNP04,
  author       = {Herbert Bos and
                  Willem de Bruijn and
                  Mihai{-}Lucian Cristea and
                  Trung Nguyen and
                  Georgios Portokalidis},
  editor       = {Eric A. Brewer and
                  Peter Chen},
  title        = {{FFPF:} Fairly Fast Packet Filters},
  booktitle    = {6th Symposium on Operating System Design and Implementation {(OSDI}
                  2004), San Francisco, California, USA, December 6-8, 2004},
  pages        = {347--363},
  publisher    = {{USENIX} Association},
  year         = {2004},
  url          = {http://www.usenix.org/events/osdi04/tech/bos.html},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/osdi/BosBCNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emsoft/BosS03,
  author       = {Herbert Bos and
                  Bart Samwel},
  editor       = {Rajeev Alur and
                  Insup Lee},
  title        = {{HOKES/POKES:} Light-Weight Resource Sharing},
  booktitle    = {Embedded Software, Third International Conference, {EMSOFT} 2003,
                  Philadelphia, PA, USA, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2855},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45212-6\_5},
  doi          = {10.1007/978-3-540-45212-6\_5},
  timestamp    = {Thu, 26 Jan 2023 14:05:53 +0100},
  biburl       = {https://dblp.org/rec/conf/emsoft/BosS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/CoppensBBMTOU03,
  author       = {Jan Coppens and
                  Steven Van den Berghe and
                  Herbert Bos and
                  Evangelos P. Markatos and
                  Filip De Turck and
                  Arne {\O}sleb{\o} and
                  Sven Ubik},
  editor       = {Alan Marshall and
                  Nazim Agoulmine},
  title        = {{SCAMPI:} {A} Scalable and Programmable Architecture for Monitoring
                  Gigabit Networks},
  booktitle    = {Management of Multimedia Networks and Services, 6th {IFIP/IEEE} International
                  Conference, {MMNS} 2003, Belfast, Northern Ireland, UK, September
                  7-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2839},
  pages        = {475--487},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39404-4\_36},
  doi          = {10.1007/978-3-540-39404-4\_36},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/CoppensBBMTOU03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/CrosbyRIB02,
  author       = {Simon Crosby and
                  Sean Rooney and
                  Rebecca Isaacs and
                  Herbert Bos},
  title        = {A perspective on how {ATM} lost control},
  journal      = {Comput. Commun. Rev.},
  volume       = {32},
  number       = {5},
  pages        = {25--28},
  year         = {2002},
  url          = {https://doi.org/10.1145/774749.774754},
  doi          = {10.1145/774749.774754},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/CrosbyRIB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwan/BosS02,
  author       = {Herbert Bos and
                  Bart Samwel},
  editor       = {James P. G. Sterbenz and
                  Osamu Takada and
                  Christian F. Tschudin and
                  Bernhard Plattner},
  title        = {The {OKE} Corral: Code Organisation and Reconfiguration at Runtime
                  Using Active Linking},
  booktitle    = {Active Networks, {IFIP-TC6} 4th International Working Conference,
                  {IWAN} 2002, Zurich, Switzerland, December 4-6, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2546},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36199-5\_3},
  doi          = {10.1007/3-540-36199-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/iwan/BosS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Bos00,
  author       = {Herbert Bos},
  title        = {Open Extensible Network Control},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {73--97},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1009467009116},
  doi          = {10.1023/A:1009467009116},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/Bos00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/Bos99,
  author       = {Herbert Bos},
  editor       = {Morris Sloman and
                  Subrata Mazumdar and
                  Emil C. Lupu},
  title        = {Application-Specific Policies: Beyond the Domain Boundaries},
  booktitle    = {1999 {IEEE/IFIP} International Symposium on Integrated Network Management,
                  {IM} 1999, Boston, USA, May 24-28, 1999. Proceedings},
  pages        = {827--840},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/INM.1999.770725},
  doi          = {10.1109/INM.1999.770725},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/Bos99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/Bos98,
  author       = {Herbert Bos},
  title        = {Efficient reservations in open {ATM} network control using on-line
                  measurements},
  journal      = {Int. J. Commun. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {247--258},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1131(199807/08)11:4\&\#60;247::AID-DAC365\&\#62;3.0.CO;2-C},
  doi          = {10.1002/(SICI)1099-1131(199807/08)11:4\&\#60;247::AID-DAC365\&\#62;3.0.CO;2-C},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/Bos98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics