Georgios Portokalidis [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT BlackHatEU-2016 - London,uk
Undermining Information Hiding (and What to Do about It) USENIX-2016 - austin,usa
ShrinkWrap: VTable protection without loose ends ACSAC-2015 - los angeles,usa
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines NDSS-2015 - san diego,usa
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard usenix-2014 - san diego,usa
Out Of Control: Overcoming Control-Flow Integrity IEEE-2014 - SamJose,USA
Exploiting Split Browsers for Efficiently Protecting User Data CCSW-2012 - Raleigh,USA
kGuard: Lightweight Kernel Protection against Return-to-User Attacks USENIX-2012 - Washington, D.C.
Ileak: A Lightweight System For Detecting Inadvertent Information Leaks EC2ND-2010 - Germany Security