Herbert Bos [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Compiler-Agnostic Function Detection in Binaries EuroSP-2017 - paris,france
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks EuroSP-2017 - paris,france
MARX: Uncovering Class Hierarchies in C++ Programs NDSS-2017 - california,usa
VUzzer: Application-aware Evolutionary Fuzzing NDSS-2017 - california,usa
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT BlackHatEU-2016 - London,uk
FLIP FENG SHUI: ROWHAMMERING THE VM'S ISOLATION BlackHatEU-2016 - London,uk
Undermining Information Hiding (and What to Do about It) USENIX-2016 - austin,usa
Poking Holes in Information Hiding USENIX-2016 - austin,usa
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries USENIX-2016 - austin,usa
OVER THE EDGE: SILENTLY OWNING WINDOWS 10'S SECURE BROWSER blackhatUS-2016 - las vegas,usa
PIE: Parser Identification in Embedded Systems ACSAC-2015 - los angeles,usa
ShrinkWrap: VTable protection without loose ends ACSAC-2015 - los angeles,usa
“Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them, Dimva-2015 - Milan,Italy
The BORG: Nanoprobing Binaries for Buffer Overreads codapspy-2015 - San Antonio,USA
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries NDSS-2015 - san diego,usa
Welcome by the chairs Raid-2014 - gottenburg,sweden
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard usenix-2014 - san diego,usa
Data structure archaeology: scrape away the dirt and glue back the pieces! (Or: automated techniques to recover split and merged variables) Dimva-2014 - London,UK
Instruction-Level Steganography for Covert Trigger-Based Malware (short paper) Dimva-2014 - London,UK
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics Dimva-2014 - London,UK
Facilitating Trust on Data through Provenance Trust-2014 - Crete,Greece
Out Of Control: Overcoming Control-Flow Integrity IEEE-2014 - SamJose,USA
Tain't not enough to fuzz all the memory errors grehack-2013 - Grenoble, France
Dowsing for Over?ows. A Guided Fuzzer to Find Buffer Boundary Violations USENIX-2013 - Washington, D.C.
Body armor for binaries GovCERT-2011 - The Netherlands Security
Security And Virtual Machines EC2ND-2007 - Heraklion, Greece Security
The Web According To W3C Chaos Communication Congress-22 - Berlin, Germany Security Web