Herbert Bos
Herbert Bos
Professor of Computer Science, Vrije Universiteit Amsterdam
Bestätigte E-Mail-Adresse bei cs.vu.nl - Startseite
TitelZitiert vonJahr
Modern Operating Systems
AS Tanenbaum, H Bos
Pearson Education, Inc, 2009
Paranoid Android: versatile protection for smartphones
G Portokalidis, P Homburg, K Anagnostakis, H Bos
Proceedings of the 26th annual computer security applications conference …, 2010
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
Can we make operating systems reliable and secure?
AS Tanenbaum, JN Herder, H Bos
Computer 39 (5), 44-51, 2006
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations
I Haller, A Slowinska, M Neugschwandtner, H Bos
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE Symposium on Security and Privacy, 65-79, 2012
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE Symposium on Security and Privacy, 97-111, 2013
MINIX 3: A highly reliable, self-repairing operating system
JN Herder, H Bos, B Gras, P Homburg, AS Tanenbaum
ACM SIGOPS Operating Systems Review 40 (3), 80-89, 2006
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
A Slowinska, T Stancescu, H Bos
NDSS, 2011
Pointless tainting?: evaluating the practicality of pointer tainting
A Slowinska, H Bos
Proceedings of the 4th ACM European conference on Computer systems, 61-74, 2009
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard
EGEAMPHBG Portokalidis
USENIX Security, 2014
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Memory errors: The past, the present, and the future
V Van der Veen, L Cavallaro, H Bos
International Workshop on Recent Advances in Intrusion Detection, 86-106, 2012
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
FFPF: Fairly Fast Packet Filters.
H Bos, W De Bruijn, ML Cristea, T Nguyen, G Portokalidis
OSDI 4, 24-24, 2004
Minemu: The world’s fastest taint tracker
E Bosman, A Slowinska, H Bos
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2011
Method and management of communications over media of finite bandwidth
J Hanko, J Wall, D Northcutt, L Butcher, AT Ruberg, H Bos
US Patent 6,438,141, 2002
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20