Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Herbert Bos
@article{DBLP:journals/pacmpl/IsemannGBKG23, author = {Raphael Isemann and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe and Klaus von Gleissenthall}, title = {Don't Look {UB:} Exposing Sanitizer-Eliding Compiler Optimizations}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{PLDI}}, pages = {907--927}, year = {2023}, url = {https://doi.org/10.1145/3591257}, doi = {10.1145/3591257}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/IsemannGBKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GerettoHGBKG23, author = {Elia Geretto and Julius Hohnerlein and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe and Klaus von Gleissenthall}, title = {Triereme: Speeding up hybrid fuzzing through efficient query scheduling}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {56--70}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627173}, doi = {10.1145/3627106.3627173}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GerettoHGBKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DioKBG23, author = {Andrea Di Dio and Koen Koning and Herbert Bos and Cristiano Giuffrida}, title = {Copy-on-Flip: Hardening {ECC} Memory Against Rowhammer Attacks}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/copy-on-flip-hardening-ecc-memory-against-rowhammer-attacks/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/DioKBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/HertoghWOMABG23, author = {Math{\'{e}} Hertogh and Manuel Wiesinger and Sebastian {\"{O}}sterlund and Marius Muench and Nadav Amit and Herbert Bos and Cristiano Giuffrida}, title = {Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {207--221}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607248}, doi = {10.1145/3607199.3607248}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/HertoghWOMABG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GorterBIKGB23, author = {Floris Gorter and Enrico Barberis and Raphael Isemann and Erik van der Kouwe and Cristiano Giuffrida and Herbert Bos}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {FloatZone: Accelerating Memory Error Detection using the Floating Point Unit}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {805--822}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gorter}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GorterBIKGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoschelBDBG23, author = {Jakob Koschel and Pietro Borrello and Daniele Cono D'Elia and Herbert Bos and Cristiano Giuffrida}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Uncontained: Uncovering Container Confusion in the Linux Kernel}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5055--5072}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/koschel}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KoschelBDBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GerettoGBK22, author = {Elia Geretto and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe}, title = {Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {375--387}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564639}, doi = {10.1145/3564625.3564639}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GerettoGBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GorterKBG22, author = {Floris Gorter and Koen Koning and Herbert Bos and Cristiano Giuffrida}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {DangZero: Efficient Use-After-Free Detection via Direct Page Table Access}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1307--1322}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560625}, doi = {10.1145/3548606.3560625}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GorterKBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/CostiJBGB22, author = {Andreas Costi and Brian Johannesmeyer and Erik Bosman and Cristiano Giuffrida and Herbert Bos}, editor = {Martina Lindorfer and Jason Polakis}, title = {On the effectiveness of same-domain memory deduplication}, booktitle = {EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, Rennes, France, April 5-8, 2022}, pages = {29--35}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3517208.3523754}, doi = {10.1145/3517208.3523754}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/CostiJBGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/BacsMRGB22, author = {Andrei Bacs and Saidgani Musaev and Kaveh Razavi and Cristiano Giuffrida and Herbert Bos}, editor = {Dean Hildebrand and Donald E. Porter}, title = {{DUPEFS:} Leaking Data Over the Network With Filesystem Deduplication Side Channels}, booktitle = {20th {USENIX} Conference on File and Storage Technologies, {FAST} 2022, Santa Clara, CA, USA, February 22-24, 2022}, pages = {281--296}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/fast22/presentation/bacs}, timestamp = {Tue, 11 Oct 2022 16:51:12 +0200}, biburl = {https://dblp.org/rec/conf/fast/BacsMRGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JohannesmeyerKR22, author = {Brian Johannesmeyer and Jakob Koschel and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, title = {Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-247/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JohannesmeyerKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BarberisFMBG22, author = {Enrico Barberis and Pietro Frigo and Marius Muench and Herbert Bos and Cristiano Giuffrida}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {971--988}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/barberis}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/BarberisFMBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TatarTGB22, author = {Andrei Tatar and Dani{\"{e}}l Trujillo and Cristiano Giuffrida and Herbert Bos}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {TLB;DR: Enhancing TLB-based Attacks with {TLB} Desynchronized Reverse Engineering}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {989--1007}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/tatar}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TatarTGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/DutaGBK21, author = {Victor Duta and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe}, editor = {Tim Sherwood and Emery D. Berger and Christos Kozyrakis}, title = {{PIBE:} practical kernel control-flow hardening with profile-guided indirect branch elimination}, booktitle = {{ASPLOS} '21: 26th {ACM} International Conference on Architectural Support for Programming Languages and Operating Systems, Virtual Event, USA, April 19-23, 2021}, pages = {743--757}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445814.3446740}, doi = {10.1145/3445814.3446740}, timestamp = {Sat, 30 Sep 2023 09:34:47 +0200}, biburl = {https://dblp.org/rec/conf/asplos/DutaGBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BhatKBG21, author = {Koustubha Bhat and Erik van der Kouwe and Herbert Bos and Cristiano Giuffrida}, title = {FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {363--375}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00048}, doi = {10.1109/DSN48987.2021.00048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BhatKBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/OsterlundGJGGHG21, author = {Sebastian {\"{O}}sterlund and Elia Geretto and Andrea Jemmett and Emre G{\"{u}}ler and Philipp G{\"{o}}rz and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, title = {CollabFuzz: {A} Framework for Collaborative Fuzzing}, booktitle = {EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021}, pages = {1--7}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447852.3458720}, doi = {10.1145/3447852.3458720}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/OsterlundGJGGHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/Mi0GB21, author = {Xianya Mi and Sanjay Rawat and Cristiano Giuffrida and Herbert Bos}, editor = {Leyla Bilge and Tudor Dumitras}, title = {LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {62--77}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471852}, doi = {10.1145/3471621.3471852}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/Mi0GB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RagabMRBG21, author = {Hany Ragab and Alyssa Milburn and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, title = {CrossTalk: Speculative Data Leaks Across Cores Are Real}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1852--1867}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00020}, doi = {10.1109/SP40001.2021.00020}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/RagabMRBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RidderFVBGR21, author = {Finn de Ridder and Pietro Frigo and Emanuele Vannacci and Herbert Bos and Cristiano Giuffrida and Kaveh Razavi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{SMASH:} Synchronized Many-sided Rowhammer Attacks from JavaScript}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1001--1018}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ridder}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/RidderFVBGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RagabBBG21, author = {Hany Ragab and Enrico Barberis and Herbert Bos and Cristiano Giuffrida}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Rage Against the Machine Clear: {A} Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1451--1468}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ragab}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RagabBBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KouweHABG20, author = {Erik van der Kouwe and Gernot Heiser and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida}, title = {Benchmarking Flaws Undermine Security Research}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {48--57}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2969862}, doi = {10.1109/MSEC.2020.2969862}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/KouweHABG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GulerGGJOBGH20, author = {Emre G{\"{u}}ler and Philipp G{\"{o}}rz and Elia Geretto and Andrea Jemmett and Sebastian {\"{O}}sterlund and Herbert Bos and Cristiano Giuffrida and Thorsten Holz}, title = {Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {360--372}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427266}, doi = {10.1145/3427228.3427266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GulerGGJOBGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoktasRPBG20, author = {Enes G{\"{o}}ktas and Kaveh Razavi and Georgios Portokalidis and Herbert Bos and Cristiano Giuffrida}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Speculative Probing: Hacking Blind in the Spectre Era}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1871--1885}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417289}, doi = {10.1145/3372297.3417289}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoktasRPBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/Stamatogiannakis20, author = {Manolis Stamatogiannakis and Herbert Bos and Paul Groth}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {PANDAcap: a framework for streamlining collection of full-system traces}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {1--6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391396}, doi = {10.1145/3380786.3391396}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/Stamatogiannakis20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KoschelGBR20, author = {Jakob Koschel and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, title = {TagBleed: Breaking {KASLR} on the Isolated Kernel Address Space using Tagged TLBs}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {309--321}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00027}, doi = {10.1109/EUROSP48549.2020.00027}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KoschelGBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KonothFFARB20, author = {Radhesh Krishnan Konoth and Bj{\"{o}}rn Fischer and Wan J. Fokkink and Elias Athanasopoulos and Kaveh Razavi and Herbert Bos}, title = {SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {569--586}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00043}, doi = {10.1109/EUROSP48549.2020.00043}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KonothFFARB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/AltinayNKRZDGNV20, author = {Anil Altinay and Joseph Nash and Taddeus Kroes and Prabhu Rajasekaran and Dixin Zhou and Adrian Dabrowski and David Gens and Yeoul Na and Stijn Volckaert and Cristiano Giuffrida and Herbert Bos and Michael Franz}, editor = {Angelos Bilas and Kostas Magoutis and Evangelos P. Markatos and Dejan Kostic and Margo I. Seltzer}, title = {BinRec: dynamic binary lifting and recompilation}, booktitle = {EuroSys '20: Fifteenth EuroSys Conference 2020, Heraklion, Greece, April 27-30, 2020}, pages = {36:1--36:16}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3342195.3387550}, doi = {10.1145/3342195.3387550}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/AltinayNKRZDGNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GrasGKBR20, author = {Ben Gras and Cristiano Giuffrida and Michael Kurth and Herbert Bos and Kaveh Razavi}, title = {ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/absynthe-automatic-blackbox-side-channel-synthesis-on-commodity-microarchitectures/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GrasGKBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KurthGAGBR20, author = {Michael Kurth and Ben Gras and Dennis Andriesse and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, title = {: Practical Cache Attacks from the Network}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {20--38}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00082}, doi = {10.1109/SP40000.2020.00082}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/KurthGAGBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FrigoVHVMGBR20, author = {Pietro Frigo and Emanuele Vannacci and Hasan Hassan and Victor van der Veen and Onur Mutlu and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, title = {TRRespass: Exploiting the Many Sides of Target Row Refresh}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {747--762}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00090}, doi = {10.1109/SP40000.2020.00090}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/FrigoVHVMGBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OsterlundRBG20, author = {Sebastian {\"{O}}sterlund and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, editor = {Srdjan Capkun and Franziska Roesner}, title = {ParmeSan: Sanitizer-guided Greybox Fuzzing}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2289--2306}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/osterlund}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/OsterlundRBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-01807, author = {Pietro Frigo and Emanuele Vannacci and Hasan Hassan and Victor van der Veen and Onur Mutlu and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, title = {TRRespass: Exploiting the Many Sides of Target Row Refresh}, journal = {CoRR}, volume = {abs/2004.01807}, year = {2020}, url = {https://arxiv.org/abs/2004.01807}, eprinttype = {arXiv}, eprint = {2004.01807}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-01807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03302, author = {Andre Pawlowski and Victor van der Veen and Dennis Andriesse and Erik van der Kouwe and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, title = {{VPS:} Excavating High-Level {C++} Constructs from Low-Level Binaries to Protect Dynamic Dispatching}, journal = {CoRR}, volume = {abs/2007.03302}, year = {2020}, url = {https://arxiv.org/abs/2007.03302}, eprinttype = {arXiv}, eprint = {2007.03302}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03302.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PawlowskiVAKHGB19, author = {Andre Pawlowski and Victor van der Veen and Dennis Andriesse and Erik van der Kouwe and Thorsten Holz and Cristiano Giuffrida and Herbert Bos}, editor = {David Balenson}, title = {{VPS:} excavating high-level {C++} constructs from low-level binaries to protect dynamic dispatching}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {97--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359797}, doi = {10.1145/3359789.3359797}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PawlowskiVAKHGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/BhatKBG19, author = {Koustubha Bhat and Erik van der Kouwe and Herbert Bos and Cristiano Giuffrida}, editor = {Iris Bahar and Maurice Herlihy and Emmett Witchel and Alvin R. Lebeck}, title = {ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations}, booktitle = {Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2019, Providence, RI, USA, April 13-17, 2019}, pages = {545--558}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297858.3304073}, doi = {10.1145/3297858.3304073}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/BhatKBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/OsterlundKOBBG19, author = {Sebastian {\"{O}}sterlund and Koen Koning and Pierre Olivier and Antonio Barbalace and Herbert Bos and Cristiano Giuffrida}, editor = {Iris Bahar and Maurice Herlihy and Emmett Witchel and Alvin R. Lebeck}, title = {kMVX: Detecting Kernel Information Leaks with Multi-variant Execution}, booktitle = {Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2019, Providence, RI, USA, April 13-17, 2019}, pages = {559--572}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297858.3304054}, doi = {10.1145/3297858.3304054}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asplos/OsterlundKOBBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KouweHABG19, author = {Erik van der Kouwe and Gernot Heiser and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida}, title = {SoK: Benchmarking Flaws in Systems Security}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {310--325}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00031}, doi = {10.1109/EUROSP.2019.00031}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KouweHABG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CojocarRGB19, author = {Lucian Cojocar and Kaveh Razavi and Cristiano Giuffrida and Herbert Bos}, title = {Exploiting Correcting Codes: On the Effectiveness of {ECC} Memory Against Rowhammer Attacks}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {55--71}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00089}, doi = {10.1109/SP.2019.00089}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CojocarRGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchaikMOFMRBG19, author = {Stephan van Schaik and Alyssa Milburn and Sebastian {\"{O}}sterlund and Pietro Frigo and Giorgi Maisuradze and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, title = {{RIDL:} Rogue In-Flight Data Load}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {88--105}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00087}, doi = {10.1109/SP.2019.00087}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchaikMOFMRBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-10794, author = {Radhesh Krishnan Konoth and Rolf van Wegberg and Veelasha Moonsamy and Herbert Bos}, title = {Malicious cryptocurrency miners: Status and Outlook}, journal = {CoRR}, volume = {abs/1901.10794}, year = {2019}, url = {http://arxiv.org/abs/1901.10794}, eprinttype = {arXiv}, eprint = {1901.10794}, timestamp = {Sun, 03 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-10794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KouweKOBG18, author = {Erik van der Kouwe and Taddeus Kroes and Chris Ouwehand and Herbert Bos and Cristiano Giuffrida}, title = {Type-After-Type: Practical and Complete Type-Safe Memory Reuse}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {17--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274705}, doi = {10.1145/3274694.3274705}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KouweKOBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jain0GB18, author = {Vivek Jain and Sanjay Rawat and Cristiano Giuffrida and Herbert Bos}, title = {{TIFF:} Using Input Type Inference To Improve Fuzzing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {505--517}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274746}, doi = {10.1145/3274694.3274746}, timestamp = {Wed, 05 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jain0GB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Goer0ABG18, author = {Franck de Go{\"{e}}r and Sanjay Rawat and Dennis Andriesse and Herbert Bos and Roland Groz}, title = {Now You See Me: Real-time Dynamic Function Call Detection}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {618--628}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274712}, doi = {10.1145/3274694.3274712}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Goer0ABG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KonothVMLKBV18, author = {Radhesh Krishnan Konoth and Emanuele Vineti and Veelasha Moonsamy and Martina Lindorfer and Christopher Kruegel and Herbert Bos and Giovanni Vigna}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1714--1730}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243858}, doi = {10.1145/3243734.3243858}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KonothVMLKBV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/VeenLFPVKBR18, author = {Victor van der Veen and Martina Lindorfer and Yanick Fratantonio and Harikrishnan Padmanabha Pillai and Giovanni Vigna and Christopher Kruegel and Herbert Bos and Kaveh Razavi}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on {ARM}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {92--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_5}, doi = {10.1007/978-3-319-93411-2\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/VeenLFPVKBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/GoktasKKBPHBG18, author = {Enes G{\"{o}}ktas and Benjamin Kollenda and Philipp Koppe and Erik Bosman and Georgios Portokalidis and Thorsten Holz and Herbert Bos and Cristiano Giuffrida}, title = {Position-Independent Code Reuse: On the Effectiveness of {ASLR} in the Absence of Information Disclosure}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {227--242}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00024}, doi = {10.1109/EUROSP.2018.00024}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/GoktasKKBPHBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/SchagenKBG18, author = {Nathan Schagen and Koen Koning and Herbert Bos and Cristiano Giuffrida}, editor = {Angelos Stavrou and Konrad Rieck}, title = {Towards Automated Vulnerability Scanning of Network Servers}, booktitle = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3193111.3193116}, doi = {10.1145/3193111.3193116}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/SchagenKBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/KroesKKBG18, author = {Taddeus Kroes and Koen Koning and Erik van der Kouwe and Herbert Bos and Cristiano Giuffrida}, editor = {Rui Oliveira and Pascal Felber and Y. Charlie Hu}, title = {Delta pointers: buffer overflow checks without the checks}, booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018}, pages = {22:1--22:14}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3190508.3190553}, doi = {10.1145/3190508.3190553}, timestamp = {Thu, 23 Jun 2022 19:57:07 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/KroesKKBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/KonothOTABGR18, author = {Radhesh Krishnan Konoth and Marco Oliverio and Andrei Tatar and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida and Kaveh Razavi}, editor = {Andrea C. Arpaci{-}Dusseau and Geoff Voelker}, title = {ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks}, booktitle = {13th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2018, Carlsbad, CA, USA, October 8-10, 2018}, pages = {697--710}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/osdi18/presentation/konoth}, timestamp = {Tue, 02 Feb 2021 08:06:02 +0100}, biburl = {https://dblp.org/rec/conf/osdi/KonothOTABGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/OikonomopoulosV18, author = {Angelos Oikonomopoulos and Remco Vermeulen and Cristiano Giuffrida and Herbert Bos}, title = {On the Effectiveness of Code Normalization for Function Identification}, booktitle = {23rd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2018, Taipei, Taiwan, December 4-7, 2018}, pages = {241--251}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PRDC.2018.00045}, doi = {10.1109/PRDC.2018.00045}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prdc/OikonomopoulosV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TatarGBR18, author = {Andrei Tatar and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Defeating Software Mitigations Against Rowhammer: {A} Surgical Precision Hammer}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {47--66}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_3}, doi = {10.1007/978-3-030-00470-5\_3}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/TatarGBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FrigoGBR18, author = {Pietro Frigo and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, title = {Grand Pwning Unit: Accelerating Microarchitectural Attacks with the {GPU}}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {195--210}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00022}, doi = {10.1109/SP.2018.00022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FrigoGBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/TatarKAGBR18, author = {Andrei Tatar and Radhesh Krishnan Konoth and Elias Athanasopoulos and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Throwhammer: Rowhammer Attacks over the Network and Defenses}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {213--226}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/tatar}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/TatarKAGBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchaikGBR18, author = {Stephan van Schaik and Cristiano Giuffrida and Herbert Bos and Kaveh Razavi}, editor = {William Enck and Adrienne Porter Felt}, title = {Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {937--954}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/van-schaik}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchaikGBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrasRBG18, author = {Ben Gras and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, editor = {William Enck and Adrienne Porter Felt}, title = {Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with {TLB} Attacks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {955--972}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/gras}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GrasRBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/18/GoktasABP18, author = {Enes G{\"{o}}ktas and Elias Athanasopoulos and Herbert Bos and Georgios Portokalidis}, editor = {Per Larsen and Ahmad{-}Reza Sadeghi}, title = {Evaluating control-flow restricting defenses}, booktitle = {The Continuing Arms Race: Code-Reuse Attacks and Defenses}, pages = {117--137}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2018}, url = {https://doi.org/10.1145/3129743.3129749}, doi = {10.1145/3129743.3129749}, timestamp = {Thu, 27 Jun 2019 20:19:31 +0200}, biburl = {https://dblp.org/rec/books/mc/18/GoktasABP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02381, author = {Erik van der Kouwe and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida and Gernot Heiser}, title = {Benchmarking Crimes: An Emerging Threat in Systems Security}, journal = {CoRR}, volume = {abs/1801.02381}, year = {2018}, url = {http://arxiv.org/abs/1801.02381}, eprinttype = {arXiv}, eprint = {1801.02381}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/Stamatogiannakis17, author = {Manolis Stamatogiannakis and Elias Athanasopoulos and Herbert Bos and Paul Groth}, title = {\emph{PROV}\({}_{\mbox{2R}}\): Practical Provenance Analysis of Unstructured Processes}, journal = {{ACM} Trans. Internet Techn.}, volume = {17}, number = {4}, pages = {37:1--37:24}, year = {2017}, url = {https://doi.org/10.1145/3062176}, doi = {10.1145/3062176}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/Stamatogiannakis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenASCBG17, author = {Victor van der Veen and Dennis Andriesse and Manolis Stamatogiannakis and Xi Chen and Herbert Bos and Cristiano Giuffrida}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1675--1689}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134026}, doi = {10.1145/3133956.3134026}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VeenASCBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KollendaGBKGKGB17, author = {Benjamin Kollenda and Enes G{\"{o}}ktas and Tim Blazytko and Philipp Koppe and Robert Gawlik and Radhesh Krishnan Konoth and Cristiano Giuffrida and Herbert Bos and Thorsten Holz}, title = {Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {189--200}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.58}, doi = {10.1109/DSN.2017.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KollendaGBKGKGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/CojocarKB17, author = {Lucian Cojocar and Taddeus Kroes and Herbert Bos}, editor = {Eric Bodden and Mathias Payer and Elias Athanasopoulos}, title = {{JTR:} {A} Binary Solution for Switch-Case Recovery}, booktitle = {Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10379}, pages = {177--195}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62105-0\_12}, doi = {10.1007/978-3-319-62105-0\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/CojocarKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/CojocarRB17, author = {Lucian Cojocar and Kaveh Razavi and Herbert Bos}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Off-the-shelf Embedded Devices as Platforms for Security Research}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {1:1--1:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065919}, doi = {10.1145/3065913.3065919}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/CojocarRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/SchaikRGBG17, author = {Stephan van Schaik and Kaveh Razavi and Ben Gras and Herbert Bos and Cristiano Giuffrida}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {RevAnC: {A} Framework for Reverse Engineering Hardware Page Table Caches}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065918}, doi = {10.1145/3065913.3065918}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/SchaikRGBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KroesKGBK17, author = {Taddeus Kroes and Koen Koning and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe}, editor = {Cristiano Giuffrida and Angelos Stavrou}, title = {Fast and Generic Metadata Management with Mid-Fat Pointers}, booktitle = {Proceedings of the 10th European Workshop on Systems Security, {EUROSEC} 2017, Belgrade, Serbia, April 23, 2017}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3065913.3065920}, doi = {10.1145/3065913.3065920}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/KroesKGBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AndriesseSB17, author = {Dennis Andriesse and Asia Slowinska and Herbert Bos}, title = {Compiler-Agnostic Function Detection in Binaries}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {177--189}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.11}, doi = {10.1109/EUROSP.2017.11}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AndriesseSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChenBG17, author = {Xi Chen and Herbert Bos and Cristiano Giuffrida}, title = {CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {514--529}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.17}, doi = {10.1109/EUROSP.2017.17}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ChenBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/KoningCBGA17, author = {Koen Koning and Xi Chen and Herbert Bos and Cristiano Giuffrida and Elias Athanasopoulos}, editor = {Gustavo Alonso and Ricardo Bianchini and Marko Vukolic}, title = {No Need to Hide: Protecting Safe Regions on Commodity Hardware}, booktitle = {Proceedings of the Twelfth European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, April 23-26, 2017}, pages = {437--452}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3064176.3064217}, doi = {10.1145/3064176.3064217}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/KoningCBGA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/RupprechtC0BLB17, author = {Thomas Rupprecht and Xi Chen and David H. White and Jan H. Boockmann and Gerald L{\"{u}}ttgen and Herbert Bos}, editor = {Grigore Rosu and Massimiliano Di Penta and Tien N. Nguyen}, title = {DSIbin: identifying dynamic data structures in {C/C++} binaries}, booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November 03, 2017}, pages = {331--341}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ASE.2017.8115646}, doi = {10.1109/ASE.2017.8115646}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/RupprechtC0BLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0001JKCGB17, author = {Sanjay Rawat and Vivek Jain and Ashish Kumar and Lucian Cojocar and Cristiano Giuffrida and Herbert Bos}, title = {VUzzer: Application-aware Evolutionary Fuzzing}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/vuzzer-application-aware-evolutionary-fuzzing/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/0001JKCGB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GrasRBBG17, author = {Ben Gras and Kaveh Razavi and Erik Bosman and Herbert Bos and Cristiano Giuffrida}, title = {{ASLR} on the Line: Practical Cache Attacks on the {MMU}}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/aslrcache-practical-cache-attacks-mmu/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GrasRBBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MilburnBG17, author = {Alyssa Milburn and Herbert Bos and Cristiano Giuffrida}, title = {Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/safelnit-comprehensive-and-practical-mitigation-uninitialized-read-vulnerabilities/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MilburnBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PawlowskiCVOHBA17, author = {Andre Pawlowski and Moritz Contag and Victor van der Veen and Chris Ouwehand and Thorsten Holz and Herbert Bos and Elias Athanasopoulos and Cristiano Giuffrida}, title = {{MARX:} Uncovering Class Hierarchies in {C++} Programs}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/marx-uncovering-class-hierarchies-c-programs/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PawlowskiCVOHBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/OliverioRBG17, author = {Marco Oliverio and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, title = {Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion}, booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017}, pages = {531--545}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132747.3132781}, doi = {10.1145/3132747.3132781}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/OliverioRBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/ChenSB16, author = {Xi Chen and Asia Slowinska and Herbert Bos}, title = {On the detection of custom memory allocators in {C} binaries}, journal = {Empir. Softw. Eng.}, volume = {21}, number = {3}, pages = {753--777}, year = {2016}, url = {https://doi.org/10.1007/s10664-015-9362-z}, doi = {10.1007/S10664-015-9362-Z}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/ChenSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/HallerSB16, author = {Istv{\'{a}}n Haller and Asia Slowinska and Herbert Bos}, title = {Scalable data structure detection and classification for {C/C++} binaries}, journal = {Empir. Softw. Eng.}, volume = {21}, number = {3}, pages = {778--810}, year = {2016}, url = {https://doi.org/10.1007/s10664-015-9363-y}, doi = {10.1007/S10664-015-9363-Y}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/HallerSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/OikonomopoulosG16, author = {Angelos Oikonomopoulos and Cristiano Giuffrida and Sanjay Rawat and Herbert Bos}, title = {Binary Rejuvenation: Applications and Challenges}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {1}, pages = {68--71}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.20}, doi = {10.1109/MSP.2016.20}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/OikonomopoulosG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HallerJPPGBK16, author = {Istv{\'{a}}n Haller and Yuseok Jeon and Hui Peng and Mathias Payer and Cristiano Giuffrida and Herbert Bos and Erik van der Kouwe}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {TypeSan: Practical Type Confusion Detection}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {517--528}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978405}, doi = {10.1145/2976749.2978405}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HallerJPPGBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenFLGMVBRG16, author = {Victor van der Veen and Yanick Fratantonio and Martina Lindorfer and Daniel Gruss and Cl{\'{e}}mentine Maurice and Giovanni Vigna and Herbert Bos and Kaveh Razavi and Cristiano Giuffrida}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Drammer: Deterministic Rowhammer Attacks on Mobile Platforms}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1675--1689}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978406}, doi = {10.1145/2976749.2978406}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeenFLGMVBRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RupprechtC0MBL16, author = {Thomas Rupprecht and Xi Chen and David H. White and Jan Tobias M{\"{u}}hlberg and Herbert Bos and Gerald L{\"{u}}ttgen}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Identifying Dynamic Data Structures in Malware}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1772--1774}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989041}, doi = {10.1145/2976749.2989041}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RupprechtC0MBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/HrubyGSBT16, author = {Tom{\'{a}}s Hrub{\'{y}} and Cristiano Giuffrida and Lionel Sambuc and Herbert Bos and Andrew S. Tanenbaum}, editor = {Athina Markopoulou and Michalis Faloutsos and Vyas Sekar and Dejan Kostic}, title = {A NEaT Design for Reliable and Scalable Network Stacks}, booktitle = {Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016}, pages = {359--373}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2999572.2999579}, doi = {10.1145/2999572.2999579}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/HrubyGSBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BhatVKGSTBG16, author = {Koustubha Bhat and Dirk Vogt and Erik van der Kouwe and Ben Gras and Lionel Sambuc and Andrew S. Tanenbaum and Herbert Bos and Cristiano Giuffrida}, title = {{OSIRIS:} Efficient and Consistent Recovery of Compartmentalized Operating Systems}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {25--36}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.12}, doi = {10.1109/DSN.2016.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BhatVKGSTBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KoningBG16, author = {Koen Koning and Herbert Bos and Cristiano Giuffrida}, title = {Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {431--442}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.46}, doi = {10.1109/DSN.2016.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KoningBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VeggalamRHB16, author = {Spandan Veggalam and Sanjay Rawat and Istv{\'{a}}n Haller and Herbert Bos}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {581--601}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_29}, doi = {10.1007/978-3-319-45744-4\_29}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/VeggalamRHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/HallerKGB16, author = {Istv{\'{a}}n Haller and Erik van der Kouwe and Cristiano Giuffrida and Herbert Bos}, editor = {Michalis Polychronakis and Cristiano Giuffrida}, title = {METAlloc: efficient and comprehensive metadata management for software security hardening}, booktitle = {Proceedings of the 9th European Workshop on System Security, {EUROSEC} 2016, London, UK, April 18-21, 2016}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2905760.2905766}, doi = {10.1145/2905760.2905766}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/HallerKGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KonothVB16, author = {Radhesh Krishnan Konoth and Victor van der Veen and Herbert Bos}, editor = {Jens Grossklags and Bart Preneel}, title = {How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {405--421}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_24}, doi = {10.1007/978-3-662-54970-4\_24}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KonothVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis16, author = {Manolis Stamatogiannakis and Hasanat Kazmi and Hashim Sharif and Remco Vermeulen and Ashish Gehani and Herbert Bos and Paul Groth}, editor = {Marta Mattoso and Boris Glavic}, title = {Trade-Offs in Automatic Provenance Capture}, booktitle = {Provenance and Annotation of Data and Processes - 6th International Provenance and Annotation Workshop, {IPAW} 2016, McLean, VA, USA, June 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9672}, pages = {29--41}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40593-3\_3}, doi = {10.1007/978-3-319-40593-3\_3}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isola/HuismanBBDGLPV16, author = {Marieke Huisman and Herbert Bos and Sjaak Brinkkemper and Arie van Deursen and Jan Friso Groote and Patricia Lago and Jaco van de Pol and Eelco Visser}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Software that Meets Its Intent}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9953}, pages = {609--625}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47169-3\_47}, doi = {10.1007/978-3-319-47169-3\_47}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isola/HuismanBBDGLPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/MiragliaVBTG16, author = {Armando Miraglia and Dirk Vogt and Herbert Bos and Andy Tanenbaum and Cristiano Giuffrida}, title = {Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging}, booktitle = {27th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2016, Ottawa, ON, Canada, October 23-27, 2016}, pages = {455--466}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISSRE.2016.9}, doi = {10.1109/ISSRE.2016.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/MiragliaVBTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BacsGGB16, author = {Andrei Bacs and Cristiano Giuffrida and Bernhard Grill and Herbert Bos}, editor = {Sascha Ossowski}, title = {Slick: an intrusion detection system for virtualized storage devices}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {2033--2040}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851795}, doi = {10.1145/2851613.2851795}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BacsGGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VeenGCPCRBHAG16, author = {Victor van der Veen and Enes G{\"{o}}ktas and Moritz Contag and Andre Pawlowski and Xi Chen and Sanjay Rawat and Herbert Bos and Thorsten Holz and Elias Athanasopoulos and Cristiano Giuffrida}, title = {A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {934--953}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.60}, doi = {10.1109/SP.2016.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/VeenGCPCRBHAG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BosmanRBG16, author = {Erik Bosman and Kaveh Razavi and Herbert Bos and Cristiano Giuffrida}, title = {Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {987--1004}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.63}, doi = {10.1109/SP.2016.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BosmanRBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RazaviGBPGB16, author = {Kaveh Razavi and Ben Gras and Erik Bosman and Bart Preneel and Cristiano Giuffrida and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {Flip Feng Shui: Hammering a Needle in the Software Stack}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1--18}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GoktasGKAPGB16, author = {Enes G{\"{o}}ktas and Robert Gawlik and Benjamin Kollenda and Elias Athanasopoulos and Georgios Portokalidis and Cristiano Giuffrida and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {Undermining Information Hiding (and What to Do about It)}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {105--119}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/goktas}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GoktasGKAPGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OikonomopoulosA16, author = {Angelos Oikonomopoulos and Elias Athanasopoulos and Herbert Bos and Cristiano Giuffrida}, editor = {Thorsten Holz and Stefan Savage}, title = {Poking Holes in Information Hiding}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {121--138}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/oikonomopoulos}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OikonomopoulosA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AndriesseCVSB16, author = {Dennis Andriesse and Xi Chen and Victor van der Veen and Asia Slowinska and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {583--600}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/andriesse}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AndriesseCVSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CojocarZVBFB15, author = {Lucian Cojocar and Jonas Zaddach and Roel Verdult and Herbert Bos and Aur{\'{e}}lien Francillon and Davide Balzarotti}, title = {{PIE:} Parser Identification in Embedded Systems}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {251--260}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818035}, doi = {10.1145/2818000.2818035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CojocarZVBFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HallerGAPB15, author = {Istv{\'{a}}n Haller and Enes G{\"{o}}ktas and Elias Athanasopoulos and Georgios Portokalidis and Herbert Bos}, title = {ShrinkWrap: VTable Protection without Loose Ends}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {341--350}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818025}, doi = {10.1145/2818000.2818025}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HallerGAPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenAGGSSBG15, author = {Victor van der Veen and Dennis Andriesse and Enes G{\"{o}}ktas and Ben Gras and Lionel Sambuc and Asia Slowinska and Herbert Bos and Cristiano Giuffrida}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Practical Context-Sensitive {CFI}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {927--940}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813673}, doi = {10.1145/2810103.2813673}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeenAGGSSBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Neugschwandtner15, author = {Matthias Neugschwandtner and Paolo Milani Comparetti and Istv{\'{a}}n Haller and Herbert Bos}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {The {BORG:} Nanoprobing Binaries for Buffer Overreads}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {87--97}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699098}, doi = {10.1145/2699026.2699098}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Neugschwandtner15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GrillBPB15, author = {Bernhard Grill and Andrei Bacs and Christian Platzer and Herbert Bos}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {"Nice Boots!" - {A} Large-Scale Analysis of Bootkits and New Ways to Stop Them}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {25--45}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_2}, doi = {10.1007/978-3-319-20550-2\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GrillBPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AndriesseBS15, author = {Dennis Andriesse and Herbert Bos and Asia Slowinska}, title = {Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {125--135}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.12}, doi = {10.1109/DSN.2015.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/AndriesseBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/VogtGBT15, author = {Dirk Vogt and Cristiano Giuffrida and Herbert Bos and Andrew S. Tanenbaum}, title = {Lightweight Memory Checkpointing}, booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015}, pages = {474--484}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSN.2015.45}, doi = {10.1109/DSN.2015.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/VogtGBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/AndriesseRB15, author = {Dennis Andriesse and Christian Rossow and Herbert Bos}, editor = {Kenjiro Cho and Kensuke Fukuda and Vivek S. Pai and Neil Spring}, title = {Reliable Recon in Adversarial Peer-to-Peer Botnets}, booktitle = {Proceedings of the 2015 {ACM} Internet Measurement Conference, {IMC} 2015, Tokyo, Japan, October 28-30, 2015}, pages = {129--140}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2815675.2815682}, doi = {10.1145/2815675.2815682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/AndriesseRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/VogtMPBTG15, author = {Dirk Vogt and Armando Miraglia and Georgios Portokalidis and Herbert Bos and Andy Tanenbaum and Cristiano Giuffrida}, editor = {Rodger Lea and Sathish Gopalakrishnan and Eli Tilevich and Amy L. Murphy and Michael Blackstock}, title = {Speculative Memory Checkpointing}, booktitle = {Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07 - 11, 2015}, pages = {197--209}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2814576.2814802}, doi = {10.1145/2814576.2814802}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/VogtMPBTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenSABG15, author = {Xi Chen and Asia Slowinska and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida}, title = {StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/stackarmor-comprehensive-protection-stack-based-memory-error-vulnerabilities-binaries}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChenSABG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapp/Stamatogiannakis15, author = {Manolis Stamatogiannakis and Paul Groth and Herbert Bos}, editor = {Paolo Missier and Jun Zhao}, title = {Decoupling Provenance Capture and Analysis from Execution}, booktitle = {7th {USENIX} Workshop on the Theory and Practice of Provenance, TaPP 2015, Edinburgh, Scotland, UK, July 8-9, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/tapp15/workshop-program/presentation/stamatogiannakis}, timestamp = {Tue, 02 Feb 2021 08:04:55 +0100}, biburl = {https://dblp.org/rec/conf/tapp/Stamatogiannakis15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2015, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5}, doi = {10.1007/978-3-319-26362-5}, isbn = {978-3-319-26361-8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/VogtGBT14, author = {Dirk Vogt and Cristiano Giuffrida and Herbert Bos and Andrew S. Tanenbaum}, title = {Techniques for efficient in-memory checkpointing}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {48}, number = {1}, pages = {21--25}, year = {2014}, url = {https://doi.org/10.1145/2626401.2626406}, doi = {10.1145/2626401.2626406}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/VogtGBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SlowinskaHBBB14, author = {Asia Slowinska and Istv{\'{a}}n Haller and Andrei Bacs and Silviu Baranga and Herbert Bos}, editor = {Sven Dietrich}, title = {Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {1--20}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_1}, doi = {10.1007/978-3-319-08509-8\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SlowinskaHBBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/AndriesseB14, author = {Dennis Andriesse and Herbert Bos}, editor = {Sven Dietrich}, title = {Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {41--50}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_3}, doi = {10.1007/978-3-319-08509-8\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/AndriesseB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14, author = {Cristiano Giuffrida and Kamil Majdanik and Mauro Conti and Herbert Bos}, editor = {Sven Dietrich}, title = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {92--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_6}, doi = {10.1007/978-3-319-08509-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/GiuffridaMCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/WelzelRB14, author = {Arne Welzel and Christian Rossow and Herbert Bos}, editor = {Davide Balzarotti and Juan Caballero}, title = {On measuring the impact of DDoS botnets}, booktitle = {Proceedings of the Seventh European Workshop on System Security, EuroSec 2014, April 13, 2014, Amsterdam, The Netherlands}, pages = {3:1--3:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2592791.2592794}, doi = {10.1145/2592791.2592794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/WelzelRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipaw/Stamatogiannakis14, author = {Manolis Stamatogiannakis and Paul Groth and Herbert Bos}, editor = {Bertram Lud{\"{a}}scher and Beth Plale}, title = {Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation}, booktitle = {Provenance and Annotation of Data and Processes - 5th International Provenance and Annotation Workshop, {IPAW} 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8628}, pages = {155--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16462-5\_12}, doi = {10.1007/978-3-319-16462-5\_12}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipaw/Stamatogiannakis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/HrubyCBT14, author = {Tom{\'{a}}s Hrub{\'{y}} and Teodor Crivat and Herbert Bos and Andrew S. Tanenbaum}, editor = {Ken Birman}, title = {On Sockets and System Calls: Minimizing Context Switches for the Socket {API}}, booktitle = {2014 Conference on Timely Results in Operating Systems, {TRIOS} '14, Broomfield, CO, USA, October 5, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/trios14/technical-sessions/presentation/hruby}, timestamp = {Tue, 02 Feb 2021 08:06:00 +0100}, biburl = {https://dblp.org/rec/conf/osdi/HrubyCBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BosmanB14, author = {Erik Bosman and Herbert Bos}, title = {Framing Signals - {A} Return to Portable Shellcode}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {243--258}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.23}, doi = {10.1109/SP.2014.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BosmanB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GoktasABP14, author = {Enes G{\"{o}}ktas and Elias Athanasopoulos and Herbert Bos and Georgios Portokalidis}, title = {Out of Control: Overcoming Control-Flow Integrity}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {575--589}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.43}, doi = {10.1109/SP.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/GoktasABP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/StamatogiannakisGB14, author = {Manolis Stamatogiannakis and Paul Groth and Herbert Bos}, editor = {Thorsten Holz and Sotiris Ioannidis}, title = {Facilitating Trust on Data through Provenance}, booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8564}, pages = {220--221}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08593-7\_21}, doi = {10.1007/978-3-319-08593-7\_21}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trust/StamatogiannakisGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GoktasAPBP14, author = {Enes G{\"{o}}ktas and Elias Athanasopoulos and Michalis Polychronakis and Herbert Bos and Georgios Portokalidis}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {417--432}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/goktas}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/GoktasAPBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosys/2014, editor = {Dick C. A. Bulterman and Herbert Bos and Antony I. T. Rowstron and Peter Druschel}, title = {Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13-16, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2592798}, isbn = {978-1-4503-2704-6}, timestamp = {Fri, 13 Jun 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2014, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1}, doi = {10.1007/978-3-319-11379-1}, isbn = {978-3-319-11378-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HallerSNB13, author = {Istv{\'{a}}n Haller and Asia Slowinska and Matthias Neugschwandtner and Herbert Bos}, title = {Dowser: {A} Guided Fuzzer for Finding Buffer Overflow Vulnerabilities}, journal = {login Usenix Mag.}, volume = {38}, number = {6}, year = {2013}, url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/dowser-guided-fuzzer-finding-buffer-overflow}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HallerSNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotdep/VogtGBT13, author = {Dirk Vogt and Cristiano Giuffrida and Herbert Bos and Andrew S. Tanenbaum}, editor = {Christian Cachin and Robbert van Renesse}, title = {Techniques for efficient in-memory checkpointing}, booktitle = {Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013, Farmington, Pennsylvania, USA, November 3, 2013}, pages = {12:1--12:5}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2524224.2524236}, doi = {10.1145/2524224.2524236}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotdep/VogtGBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/AndriesseRSPB13, author = {Dennis Andriesse and Christian Rossow and Brett Stone{-}Gross and Daniel Plohmann and Herbert Bos}, title = {Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {116--123}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703693}, doi = {10.1109/MALWARE.2013.6703693}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/AndriesseRSPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RossowAWSPDB13, author = {Christian Rossow and Dennis Andriesse and Tillmann Werner and Brett Stone{-}Gross and Daniel Plohmann and Christian J. Dietrich and Herbert Bos}, title = {SoK: {P2PWNED} - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {97--111}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.17}, doi = {10.1109/SP.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RossowAWSPDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/HrubyBT13, author = {Tom{\'{a}}s Hrub{\'{y}} and Herbert Bos and Andrew S. Tanenbaum}, editor = {Andrew Birrell and Emin G{\"{u}}n Sirer}, title = {When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems}, booktitle = {2013 {USENIX} Annual Technical Conference, San Jose, CA, USA, June 26-28, 2013}, pages = {255--266}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/atc13/technical-sessions/presentation/hruby}, timestamp = {Mon, 01 Feb 2021 08:43:29 +0100}, biburl = {https://dblp.org/rec/conf/usenix/HrubyBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HallerSNB13, author = {Istv{\'{a}}n Haller and Asia Slowinska and Matthias Neugschwandtner and Herbert Bos}, editor = {Samuel T. King}, title = {Dowsing for Overflows: {A} Guided Fuzzer to Find Buffer Boundary Violations}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {49--64}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/papers/haller}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/HallerSNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ChenSB13, author = {Xi Chen and Asia Slowinska and Herbert Bos}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {Who allocated my memory? Detecting custom memory allocators in {C} binaries}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {22--31}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671277}, doi = {10.1109/WCRE.2013.6671277}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/ChenSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HallerSB13, author = {Istv{\'{a}}n Haller and Asia Slowinska and Herbert Bos}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {MemPick: High-level data structure detection in {C/C++} binaries}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {32--41}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671278}, doi = {10.1109/WCRE.2013.6671278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/HallerSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ChenSB13a, author = {Xi Chen and Asia Slowinska and Herbert Bos}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {MemBrush: {A} practical tool to detect custom memory allocators in {C} binaries}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {477--478}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671326}, doi = {10.1109/WCRE.2013.6671326}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/ChenSB13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HallerSB13a, author = {Istv{\'{a}}n Haller and Asia Slowinska and Herbert Bos}, editor = {Ralf L{\"{a}}mmel and Rocco Oliveto and Romain Robbes}, title = {MemPick: {A} tool for data structure detection}, booktitle = {20th Working Conference on Reverse Engineering, {WCRE} 2013, Koblenz, Germany, October 14-17, 2013}, pages = {479--480}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WCRE.2013.6671327}, doi = {10.1109/WCRE.2013.6671327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/HallerSB13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RossowDB12, author = {Christian Rossow and Christian J. Dietrich and Herbert Bos}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {Large-Scale Analysis of Malware Downloaders}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {42--61}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_3}, doi = {10.1007/978-3-642-37300-8\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/RossowDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BacsVSB12, author = {Andrei Bacs and Remco Vermeulen and Asia Slowinska and Herbert Bos}, editor = {Ulrich Flegel and Evangelos P. Markatos and William K. Robertson}, title = {System-Level Support for Intrusion Recovery}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, {DIMVA} 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7591}, pages = {144--163}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37300-8\_9}, doi = {10.1007/978-3-642-37300-8\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BacsVSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HrubyVBT12, author = {Tom{\'{a}}s Hrub{\'{y}} and Dirk Vogt and Herbert Bos and Andrew S. Tanenbaum}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Keep net working - on a dependable and fast networking stack}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263933}, doi = {10.1109/DSN.2012.6263933}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HrubyVBT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/VeendCB12, author = {Victor van der Veen and Nitish dutt{-}Sharma and Lorenzo Cavallaro and Herbert Bos}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {Memory Errors: The Past, the Present, and the Future}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {86--106}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_5}, doi = {10.1007/978-3-642-33338-5\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/VeendCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12, author = {Christian Rossow and Christian J. Dietrich and Chris Grier and Christian Kreibich and Vern Paxson and Norbert Pohlmann and Herbert Bos and Maarten van Steen}, title = {Prudent Practices for Designing Malware Experiments: Status Quo and Outlook}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {65--79}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.14}, doi = {10.1109/SP.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RossowDGKPPBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/SlowinskiSB12, author = {Asia Slowinska and Traian Stancescu and Herbert Bos}, editor = {Gernot Heiser and Wilson C. Hsieh}, title = {Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation}, booktitle = {2012 {USENIX} Annual Technical Conference, Boston, MA, USA, June 13-15, 2012}, pages = {125--137}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/slowinska}, timestamp = {Mon, 01 Feb 2021 08:43:32 +0100}, biburl = {https://dblp.org/rec/conf/usenix/SlowinskiSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosys/2012, editor = {Pascal Felber and Frank Bellosa and Herbert Bos}, title = {European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2168836}, isbn = {978-1-4503-1223-3}, timestamp = {Thu, 19 Apr 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/MarkatosB12, author = {Evangelos P. Markatos and Herbert Bos}, title = {SysSec: Managing Threats and Vulnerabilities in the Future Internet}, journal = {{ERCIM} News}, volume = {2012}, number = {90}, year = {2012}, url = {http://ercim-news.ercim.eu/en90/special/syssec-managing-threats-and-vulnerabilities-in-the-future-internet}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/MarkatosB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/BruijnBB11, author = {Willem de Bruijn and Herbert Bos and Henri E. Bal}, title = {Application-Tailored {I/O} with Streamline}, journal = {{ACM} Trans. Comput. Syst.}, volume = {29}, number = {2}, pages = {6:1--6:33}, year = {2011}, url = {https://doi.org/10.1145/1963559.1963562}, doi = {10.1145/1963559.1963562}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocs/BruijnBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/RossowDBCSFP11, author = {Christian Rossow and Christian J. Dietrich and Herbert Bos and Lorenzo Cavallaro and Maarten van Steen and Felix C. Freiling and Norbert Pohlmann}, editor = {Engin Kirda and Thorsten Holz}, title = {Sandnet: network traffic analysis of malicious software}, booktitle = {Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011}, pages = {78--88}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978672.1978682}, doi = {10.1145/1978672.1978682}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/badgers/RossowDBCSFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BosCT11, author = {Herbert Bos and Lorenzo Cavallaro and Andrew S. Tanenbaum}, title = {Systems Security at {VU} University Amsterdam}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {111--114}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.26}, doi = {10.1109/SYSSEC.2011.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/BosCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ec2nd/DietrichRFBSP11, author = {Christian J. Dietrich and Christian Rossow and Felix C. Freiling and Herbert Bos and Maarten van Steen and Norbert Pohlmann}, title = {On Botnets That Use {DNS} for Command and Control}, booktitle = {Seventh European Conference on Computer Network Defense, {EC2ND} 2011, Gothenburg, Sweden, September 6-7, 2011}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/EC2ND.2011.16}, doi = {10.1109/EC2ND.2011.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ec2nd/DietrichRFBSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SlowinskaSB11, author = {Asia Slowinska and Traian Stancescu and Herbert Bos}, title = {Howard: {A} Dynamic Excavator for Reverse Engineering Data Structures}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/howard-a-dynamic-excavator-for-reverse-engineering-data-structures}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SlowinskaSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BosmanSB11, author = {Erik Bosman and Asia Slowinska and Herbert Bos}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {Minemu: The World's Fastest Taint Tracker}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_1}, doi = {10.1007/978-3-642-23644-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BosmanSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2011, editor = {Thorsten Holz and Herbert Bos}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9}, doi = {10.1007/978-3-642-22424-9}, isbn = {978-3-642-22423-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/SlowinskaB10, author = {Asia Slowinska and Herbert Bos}, title = {Pointer tainting still pointless: (but we all see the point of tainting)}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {44}, number = {3}, pages = {88--92}, year = {2010}, url = {https://doi.org/10.1145/1842733.1842748}, doi = {10.1145/1842733.1842748}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/SlowinskaB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/TanenbaumABCGHH10, author = {Andrew S. Tanenbaum and Raja Appuswamy and Herbert Bos and Lorenzo Cavallaro and Cristiano Giuffrida and Tom{\'{a}}s Hrub{\'{y}} and Jorrit N. Herder and Erik van der Kouwe and David C. van Moolenbroek}, title = {{MINIX} 3: Status Report and Current Research}, journal = {login Usenix Mag.}, volume = {35}, number = {3}, year = {2010}, url = {https://www.usenix.org/publications/login/june-2010-volume-35-number-3/minix-3-status-report-and-current-research}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/TanenbaumABCGHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PortokalidisHAB10, author = {Georgios Portokalidis and Philip Homburg and Kostas Anagnostakis and Herbert Bos}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Paranoid Android: versatile protection for smartphones}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {347--356}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920313}, doi = {10.1145/1920261.1920313}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PortokalidisHAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/VijzelaarBF10, author = {Stefan Vijzelaar and Herbert Bos and Wan J. Fokkink}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {Brief announcement: a shared disk on distributed storage}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {79--80}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835718}, doi = {10.1145/1835698.1835718}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/VijzelaarBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SlowinskaSB10, author = {Asia Slowinska and Traian Stancescu and Herbert Bos}, editor = {Chandramohan A. Thekkath and Ramakrishna Kotla and Lidong Zhou}, title = {{DDE:} dynamic data structure excavation}, booktitle = {Proceedings of the 1st {ACM} {SIGCOMM} Asia-Pacific Workshop on Systems, ApSys 2010, New Delhi, India, August 30, 2010}, pages = {13--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1851276.1851280}, doi = {10.1145/1851276.1851280}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/SlowinskaSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HerderBGHT09, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Fault isolation for device drivers}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270357}, doi = {10.1109/DSN.2009.5270357}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HerderBGHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/SlowinskaB09, author = {Asia Slowinska and Herbert Bos}, editor = {Wolfgang Schr{\"{o}}der{-}Preikschat and John Wilkes and Rebecca Isaacs}, title = {Pointless tainting?: evaluating the practicality of pointer tainting}, booktitle = {Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009}, pages = {61--74}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519065.1519073}, doi = {10.1145/1519065.1519073}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/SlowinskaB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/NijhuisBBA09, author = {Maik Nijhuis and Herbert Bos and Henri E. Bal and C{\'{e}}dric Augonnet}, editor = {Andr{\'{e}} Seznec and Joel S. Emer and Michael F. P. O'Boyle and Margaret Martonosi and Theo Ungerer}, title = {Mapping and Synchronizing Streaming Applications on Cell Processors}, booktitle = {High Performance Embedded Architectures and Compilers, Fourth International Conference, HiPEAC 2009, Paphos, Cyprus, January 25-28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5409}, pages = {216--230}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-92990-1\_17}, doi = {10.1007/978-3-540-92990-1\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/NijhuisBBA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/BosSCA08, author = {Herbert Bos and Bart Samwel and Mihai{-}Lucian Cristea and Kostas Anagnostakis}, title = {Safe execution of untrusted applications on embedded network processors}, journal = {Int. J. Embed. Syst.}, volume = {3}, number = {4}, pages = {294--303}, year = {2008}, url = {https://doi.org/10.1504/IJES.2008.022399}, doi = {10.1504/IJES.2008.022399}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/BosSCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BruijnB08, author = {Willem de Bruijn and Herbert Bos}, title = {PipesFS: fast Linux {I/O} in the unix tradition}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {42}, number = {5}, pages = {55--63}, year = {2008}, url = {https://doi.org/10.1145/1400097.1400104}, doi = {10.1145/1400097.1400104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BruijnB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PortokalidisB08, author = {Georgios Portokalidis and Herbert Bos}, editor = {Joseph S. Sventek and Steven Hand}, title = {Eudaemon: involuntary and on-demand emulation against zero-day exploits}, booktitle = {Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008}, pages = {287--299}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352592.1352622}, doi = {10.1145/1352592.1352622}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PortokalidisB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BruijnB08, author = {Willem de Bruijn and Herbert Bos}, title = {Beltway Buffers: Avoiding the {OS} Traffic Jam}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {136--140}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.36}, doi = {10.1109/INFOCOM.2008.36}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BruijnB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/HerderBGHT08, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Countering {IPC} Threats in Multiserver Operating Systems {(A} Fundamental Requirement for Dependability)}, booktitle = {14th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2008, 15-17 December 2008, Taipei, Taiwan}, pages = {112--121}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PRDC.2008.25}, doi = {10.1109/PRDC.2008.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/HerderBGHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurosec/2008, editor = {Herbert Bos and Evangelos P. Markatos}, title = {Proceedings of the First European Workshop on System Security, {EUROSEC} 2008, Glasgow, Scotland, UK, March 31, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-119-4}, timestamp = {Tue, 13 Apr 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PortokalidisB07, author = {Georgios Portokalidis and Herbert Bos}, title = {SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots}, journal = {Comput. Networks}, volume = {51}, number = {5}, pages = {1256--1274}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2006.09.005}, doi = {10.1016/J.COMNET.2006.09.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PortokalidisB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HerderBGHT07, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Roadmap to a Failure-Resilient Operating System}, journal = {login Usenix Mag.}, volume = {32}, number = {1}, year = {2007}, url = {https://www.usenix.org/publications/login/february-2007-volume-32-number-1/roadmap-failure-resilient-operating-system}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HerderBGHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SlowinskaB07, author = {Asia Slowinska and Herbert Bos}, title = {The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {487--500}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.32}, doi = {10.1109/ACSAC.2007.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SlowinskaB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/HrubyRB07, author = {Tom{\'{a}}s Hrub{\'{y}} and Kees van Reeuwijk and Herbert Bos}, editor = {Raj Yavatkar and Dirk Grunwald and K. K. Ramakrishnan}, title = {Ruler: high-speed packet matching and rewriting on NPUs}, booktitle = {Proceedings of the 2007 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2007, Orlando, Florida, USA, December 3-4, 2007}, pages = {1--10}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1323548.1323550}, doi = {10.1145/1323548.1323550}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ancs/HrubyRB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HerderBGHT07, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Failure Resilience for Device Drivers}, booktitle = {The 37th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK, Proceedings}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DSN.2007.46}, doi = {10.1109/DSN.2007.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HerderBGHT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/NijhuisBB07, author = {Maik Nijhuis and Herbert Bos and Henri E. Bal}, title = {A Component-based Coordination Language for Efficient Reconfigurable Streaming Applications}, booktitle = {2007 International Conference on Parallel Processing {(ICPP} 2007), September 10-14, 2007, Xi-An, China}, pages = {60}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICPP.2007.5}, doi = {10.1109/ICPP.2007.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/NijhuisBB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/CristeaGXB07, author = {Mihai{-}Lucian Cristea and Leon Gommans and Li Xu and Herbert Bos}, editor = {Ian F. Akyildiz and Raghupathy Sivakumar and Eylem Ekici and Jaudelice Cavalcante de Oliveira and Janise McNair}, title = {The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts}, booktitle = {{NETWORKING} 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International {IFIP-TC6} Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4479}, pages = {945--957}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72606-7\_81}, doi = {10.1007/978-3-540-72606-7\_81}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/CristeaGXB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BosSB06, author = {Herbert Bos and Bart Samwel and Ilja Booij}, title = {Dynamically extending the Corral with native code for high-speed packet processing}, journal = {Comput. Networks}, volume = {50}, number = {14}, pages = {2444--2461}, year = {2006}, url = {https://doi.org/10.1016/j.comnet.2006.04.019}, doi = {10.1016/J.COMNET.2006.04.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BosSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TanenbaumHB06, author = {Andrew S. Tanenbaum and Jorrit N. Herder and Herbert Bos}, title = {Can We Make Operating Systems Reliable and Secure?}, journal = {Computer}, volume = {39}, number = {5}, pages = {44--51}, year = {2006}, url = {https://doi.org/10.1109/MC.2006.156}, doi = {10.1109/MC.2006.156}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TanenbaumHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/TanenbaumHB06, author = {Andrew S. Tanenbaum and Jorrit N. Herder and Herbert Bos}, title = {File size distribution on {UNIX} systems: then and now}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {40}, number = {1}, pages = {100--104}, year = {2006}, url = {https://doi.org/10.1145/1113361.1113364}, doi = {10.1145/1113361.1113364}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/TanenbaumHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/HerderBGHT06, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {{MINIX} 3: a highly reliable, self-repairing operating system}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {40}, number = {3}, pages = {80--89}, year = {2006}, url = {https://doi.org/10.1145/1151374.1151391}, doi = {10.1145/1151374.1151391}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/HerderBGHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/HerderBGHT06, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Modular System Programming in {MINIX} 3}, journal = {login Usenix Mag.}, volume = {31}, number = {2}, year = {2006}, url = {https://www.usenix.org/publications/login/april-2006-volume-31-number-2/modular-system-programming-minix-3}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/HerderBGHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aPcsac/HerderBGHT06, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, editor = {Chris R. Jesshope and Colin Egan}, title = {Reorganizing {UNIX} for Reliability}, booktitle = {Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, {ACSAC} 2006, Shanghai, China, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4186}, pages = {81--94}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11859802\_8}, doi = {10.1007/11859802\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/aPcsac/HerderBGHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/HerderBGHT06, author = {Jorrit N. Herder and Herbert Bos and Ben Gras and Philip Homburg and Andrew S. Tanenbaum}, title = {Construction of a Highly Dependable Operating System}, booktitle = {Sixth European Dependable Computing Conference, {EDCC} 2006, Coimbra, Portugal, 18-20 October 2006}, pages = {3--12}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDCC.2006.7}, doi = {10.1109/EDCC.2006.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/HerderBGHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/NijhuisBB06, author = {Maik Nijhuis and Herbert Bos and Henri E. Bal}, editor = {Wolfgang E. Nagel and Wolfgang V. Walter and Wolfgang Lehner}, title = {Supporting Reconfigurable Parallel Multimedia Applications}, booktitle = {Euro-Par 2006, Parallel Processing, 12th International Euro-Par Conference, Dresden, Germany, August 28 - September 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4128}, pages = {765--776}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11823285\_80}, doi = {10.1007/11823285\_80}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/NijhuisBB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06, author = {Georgios Portokalidis and Asia Slowinska and Herbert Bos}, editor = {Yolande Berbers and Willy Zwaenepoel}, title = {Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation}, booktitle = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006}, pages = {15--27}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1217935.1217938}, doi = {10.1145/1217935.1217938}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PortokalidisSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcpc/VarbanescuNGSBB06, author = {Ana Lucia Varbanescu and Maik Nijhuis and Arturo Gonz{\'{a}}lez{-}Escribano and Henk J. Sips and Herbert Bos and Henri E. Bal}, editor = {George Alm{\'{a}}si and Calin Cascaval and Peng Wu}, title = {SP@CE - An SP-Based Programming Model for Consumer Electronics Streaming Applications}, booktitle = {Languages and Compilers for Parallel Computing, 19th International Workshop, {LCPC} 2006, New Orleans, LA, USA, November 2-4, 2006. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4382}, pages = {33--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-72521-3\_4}, doi = {10.1007/978-3-540-72521-3\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/lcpc/VarbanescuNGSBB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BruijnSRHXB06, author = {Willem de Bruijn and Asia Slowinska and Kees van Reeuwijk and Tom{\'{a}}s Hrub{\'{y}} and Li Xu and Herbert Bos}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {SafeCard: {A} Gigabit {IPS} on the Network Card}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {311--330}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_16}, doi = {10.1007/11856214\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BruijnSRHXB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/CristeaBB05, author = {Mihai{-}Lucian Cristea and Willem de Bruijn and Herbert Bos}, editor = {Raouf Boutaba and Kevin C. Almeroth and Ram{\'{o}}n Puigjaner and Sherman X. Shen and James P. Black}, title = {{FPL-3:} Towards Language Support for Distributed Packet Processing}, booktitle = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International {IFIP-TC6} Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3462}, pages = {743--755}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11422778\_60}, doi = {10.1007/11422778\_60}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/CristeaBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BosH05, author = {Herbert Bos and Kaiming Huang}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {102--123}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_6}, doi = {10.1007/11663812\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BosH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/CristeaZDB05, author = {Mihai{-}Lucian Cristea and Claudiu Zissulescu and Ed F. Deprettere and Herbert Bos}, editor = {Timo D. H{\"{a}}m{\"{a}}l{\"{a}}inen and Andy D. Pimentel and Jarmo Takala and Stamatis Vassiliadis}, title = {{FPL-3E:} Towards Language Support for Reconfigurable Packet Processing}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation 5th International Workshop, {SAMOS} 2005, Samos, Greece, July 18-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3553}, pages = {82--92}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11512622\_10}, doi = {10.1007/11512622\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/samos/CristeaZDB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/BruijnBB05, author = {Willem de Bruijn and Herbert Bos and Henri E. Bal}, title = {Robust Distributed Systems Achieving Self-Management through Inference}, booktitle = {2005 International Conference on a World of Wireless, Mobile and Multimedia Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings}, pages = {542--546}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WOWMOM.2005.90}, doi = {10.1109/WOWMOM.2005.90}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wowmom/BruijnBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/BruijnMB04, author = {Willem de Bruijn and Jon T. Moore and Herbert Bos}, title = {Splash: {SNMP} Plus a Lightweight {API} for {SNAP} Handling}, booktitle = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea, 19-23 April 2004, Proceedings}, pages = {743--756}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/NOMS.2004.1317761}, doi = {10.1109/NOMS.2004.1317761}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/BruijnMB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/BosBCNP04, author = {Herbert Bos and Willem de Bruijn and Mihai{-}Lucian Cristea and Trung Nguyen and Georgios Portokalidis}, editor = {Eric A. Brewer and Peter Chen}, title = {{FFPF:} Fairly Fast Packet Filters}, booktitle = {6th Symposium on Operating System Design and Implementation {(OSDI} 2004), San Francisco, California, USA, December 6-8, 2004}, pages = {347--363}, publisher = {{USENIX} Association}, year = {2004}, url = {http://www.usenix.org/events/osdi04/tech/bos.html}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/osdi/BosBCNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/BosS03, author = {Herbert Bos and Bart Samwel}, editor = {Rajeev Alur and Insup Lee}, title = {{HOKES/POKES:} Light-Weight Resource Sharing}, booktitle = {Embedded Software, Third International Conference, {EMSOFT} 2003, Philadelphia, PA, USA, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2855}, pages = {51--66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45212-6\_5}, doi = {10.1007/978-3-540-45212-6\_5}, timestamp = {Thu, 26 Jan 2023 14:05:53 +0100}, biburl = {https://dblp.org/rec/conf/emsoft/BosS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/CoppensBBMTOU03, author = {Jan Coppens and Steven Van den Berghe and Herbert Bos and Evangelos P. Markatos and Filip De Turck and Arne {\O}sleb{\o} and Sven Ubik}, editor = {Alan Marshall and Nazim Agoulmine}, title = {{SCAMPI:} {A} Scalable and Programmable Architecture for Monitoring Gigabit Networks}, booktitle = {Management of Multimedia Networks and Services, 6th {IFIP/IEEE} International Conference, {MMNS} 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2839}, pages = {475--487}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39404-4\_36}, doi = {10.1007/978-3-540-39404-4\_36}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmns/CoppensBBMTOU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/CrosbyRIB02, author = {Simon Crosby and Sean Rooney and Rebecca Isaacs and Herbert Bos}, title = {A perspective on how {ATM} lost control}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {5}, pages = {25--28}, year = {2002}, url = {https://doi.org/10.1145/774749.774754}, doi = {10.1145/774749.774754}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/CrosbyRIB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwan/BosS02, author = {Herbert Bos and Bart Samwel}, editor = {James P. G. Sterbenz and Osamu Takada and Christian F. Tschudin and Bernhard Plattner}, title = {The {OKE} Corral: Code Organisation and Reconfiguration at Runtime Using Active Linking}, booktitle = {Active Networks, {IFIP-TC6} 4th International Working Conference, {IWAN} 2002, Zurich, Switzerland, December 4-6, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2546}, pages = {32--47}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36199-5\_3}, doi = {10.1007/3-540-36199-5\_3}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/iwan/BosS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Bos00, author = {Herbert Bos}, title = {Open Extensible Network Control}, journal = {J. Netw. Syst. Manag.}, volume = {8}, number = {1}, pages = {73--97}, year = {2000}, url = {https://doi.org/10.1023/A:1009467009116}, doi = {10.1023/A:1009467009116}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/Bos00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/Bos99, author = {Herbert Bos}, editor = {Morris Sloman and Subrata Mazumdar and Emil C. Lupu}, title = {Application-Specific Policies: Beyond the Domain Boundaries}, booktitle = {1999 {IEEE/IFIP} International Symposium on Integrated Network Management, {IM} 1999, Boston, USA, May 24-28, 1999. Proceedings}, pages = {827--840}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/INM.1999.770725}, doi = {10.1109/INM.1999.770725}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/Bos99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/Bos98, author = {Herbert Bos}, title = {Efficient reservations in open {ATM} network control using on-line measurements}, journal = {Int. J. Commun. Syst.}, volume = {11}, number = {4}, pages = {247--258}, year = {1998}, url = {https://doi.org/10.1002/(SICI)1099-1131(199807/08)11:4\&\#60;247::AID-DAC365\&\#62;3.0.CO;2-C}, doi = {10.1002/(SICI)1099-1131(199807/08)11:4\&\#60;247::AID-DAC365\&\#62;3.0.CO;2-C}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/Bos98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.