Christopher Liebchen
Christopher Liebchen
Technische Universität Darmstadt
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
5802013
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
3792015
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
2622015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
2022015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1652015
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1402015
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1062016
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 365-383, 2014
792014
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
572017
CAn’t touch this: Software-only mitigation against Rowhammer attacks targeting kernel memory
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
26th {USENIX} Security Symposium ({USENIX} Security 17), 117-130, 2017
542017
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
Intel Technology Journal 18 (4), 2014
492014
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
L Davi, D Gens, C Liebchen, AR Sadeghi
NDSS, 2017
452017
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proc. Priv. Enhancing Technol. 2016 (4), 454-469, 2016
412016
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
402016
{IMIX}: In-process memory isolation extension
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th {USENIX} Security Symposium ({USENIX} Security 18), 83-97, 2018
352018
Jitguard: hardening just-in-time compilers with sgx
T Frassetto, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
302017
Can't touch this: Practical and generic software-only defenses against rowhammer attacks
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
arXiv preprint arXiv:1611.08396, 2016
282016
Revisiting context-based authentication in IoT
M Miettinen, TD Nguyen, AR Sadeghi, N Asokan
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
242018
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
132017
RIP-RH: Preventing rowhammer-based inter-process attacks
C Bock, F Brasser, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20