default search action
Herbert Bos
Person information
- affiliation: Vrije Universiteit Amsterdam, The Netherlands
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c159]Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida:
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. SP 2024: 4239-4257 - [c158]Brian Johannesmeyer, Asia Slowinska, Herbert Bos, Cristiano Giuffrida:
Practical Data-Only Attack Generation. USENIX Security Symposium 2024 - [c157]Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida:
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2. USENIX Security Symposium 2024 - 2023
- [j23]Raphael Isemann, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall:
Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations. Proc. ACM Program. Lang. 7(PLDI): 907-927 (2023) - [c156]Elia Geretto, Julius Hohnerlein, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall:
Triereme: Speeding up hybrid fuzzing through efficient query scheduling. ACSAC 2023: 56-70 - [c155]Andrea Di Dio, Koen Koning, Herbert Bos, Cristiano Giuffrida:
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. NDSS 2023 - [c154]Mathé Hertogh, Manuel Wiesinger, Sebastian Österlund, Marius Muench, Nadav Amit, Herbert Bos, Cristiano Giuffrida:
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. RAID 2023: 207-221 - [c153]Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos:
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. USENIX Security Symposium 2023: 805-822 - [c152]Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida:
Uncontained: Uncovering Container Confusion in the Linux Kernel. USENIX Security Symposium 2023: 5055-5072 - 2022
- [c151]Elia Geretto, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. ACSAC 2022: 375-387 - [c150]Floris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida:
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. CCS 2022: 1307-1322 - [c149]Andreas Costi, Brian Johannesmeyer, Erik Bosman, Cristiano Giuffrida, Herbert Bos:
On the effectiveness of same-domain memory deduplication. EuroSec@EUROSYS 2022: 29-35 - [c148]Andrei Bacs, Saidgani Musaev, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos:
DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. FAST 2022: 281-296 - [c147]Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. NDSS 2022 - [c146]Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida:
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. USENIX Security Symposium 2022: 971-988 - [c145]Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos:
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. USENIX Security Symposium 2022: 989-1007 - 2021
- [c144]Victor Duta, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination. ASPLOS 2021: 743-757 - [c143]Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida:
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection. DSN 2021: 363-375 - [c142]Sebastian Österlund, Elia Geretto, Andrea Jemmett, Emre Güler, Philipp Görz, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
CollabFuzz: A Framework for Collaborative Fuzzing. EuroSec@EuroSys 2021: 1-7 - [c141]Xianya Mi, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. RAID 2021: 62-77 - [c140]Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
CrossTalk: Speculative Data Leaks Across Cores Are Real. SP 2021: 1852-1867 - [c139]Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. USENIX Security Symposium 2021: 1001-1018 - [c138]Hany Ragab, Enrico Barberis, Herbert Bos, Cristiano Giuffrida:
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. USENIX Security Symposium 2021: 1451-1468 - 2020
- [j22]Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
Benchmarking Flaws Undermine Security Research. IEEE Secur. Priv. 18(3): 48-57 (2020) - [c137]Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz:
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. ACSAC 2020: 360-372 - [c136]Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida:
Speculative Probing: Hacking Blind in the Spectre Era. CCS 2020: 1871-1885 - [c135]Manolis Stamatogiannakis, Herbert Bos, Paul Groth:
PANDAcap: a framework for streamlining collection of full-system traces. EuroSec@EuroSys 2020: 1-6 - [c134]Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. EuroS&P 2020: 309-321 - [c133]Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos:
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. EuroS&P 2020: 569-586 - [c132]Anil Altinay, Joseph Nash, Taddeus Kroes, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Cristiano Giuffrida, Herbert Bos, Michael Franz:
BinRec: dynamic binary lifting and recompilation. EuroSys 2020: 36:1-36:16 - [c131]Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi:
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. NDSS 2020 - [c130]Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
: Practical Cache Attacks from the Network. SP 2020: 20-38 - [c129]Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TRRespass: Exploiting the Many Sides of Target Row Refresh. SP 2020: 747-762 - [c128]Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
ParmeSan: Sanitizer-guided Greybox Fuzzing. USENIX Security Symposium 2020: 2289-2306 - [d1]Manolis Stamatogiannakis, Herbert Bos, Paul Groth:
PANDAcap SSH Honeypot Dataset. Zenodo, 2020 - [i5]Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TRRespass: Exploiting the Many Sides of Target Row Refresh. CoRR abs/2004.01807 (2020) - [i4]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. CoRR abs/2007.03302 (2020)
2010 – 2019
- 2019
- [c127]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. ACSAC 2019: 97-112 - [c126]Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida:
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations. ASPLOS 2019: 545-558 - [c125]Sebastian Österlund, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, Cristiano Giuffrida:
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution. ASPLOS 2019: 559-572 - [c124]Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
SoK: Benchmarking Flaws in Systems Security. EuroS&P 2019: 310-325 - [c123]Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos:
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. IEEE Symposium on Security and Privacy 2019: 55-71 - [c122]Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
RIDL: Rogue In-Flight Data Load. IEEE Symposium on Security and Privacy 2019: 88-105 - [i3]Radhesh Krishnan Konoth, Rolf van Wegberg, Veelasha Moonsamy, Herbert Bos:
Malicious cryptocurrency miners: Status and Outlook. CoRR abs/1901.10794 (2019) - 2018
- [c121]Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida:
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. ACSAC 2018: 17-27 - [c120]Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
TIFF: Using Input Type Inference To Improve Fuzzing. ACSAC 2018: 505-517 - [c119]Franck de Goër, Sanjay Rawat, Dennis Andriesse, Herbert Bos, Roland Groz:
Now You See Me: Real-time Dynamic Function Call Detection. ACSAC 2018: 618-628 - [c118]Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. CCS 2018: 1714-1730 - [c117]Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. DIMVA 2018: 92-113 - [c116]Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. EuroS&P 2018: 227-242 - [c115]Nathan Schagen, Koen Koning, Herbert Bos, Cristiano Giuffrida:
Towards Automated Vulnerability Scanning of Network Servers. EuroSec@EuroSys 2018: 5:1-5:6 - [c114]Taddeus Kroes, Koen Koning, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida:
Delta pointers: buffer overflow checks without the checks. EuroSys 2018: 22:1-22:14 - [c113]Taddeus Kroes, Anil Altinay, Joseph Nash, Yeoul Na, Stijn Volckaert, Herbert Bos, Michael Franz, Cristiano Giuffrida:
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery. FEAST@CCS 2018: 8-13 - [c112]Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. OSDI 2018: 697-710 - [c111]Angelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida, Herbert Bos:
On the Effectiveness of Code Normalization for Function Identification. PRDC 2018: 241-251 - [c110]Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. RAID 2018: 47-66 - [c109]Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. IEEE Symposium on Security and Privacy 2018: 195-210 - [c108]Andrei Tatar, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Throwhammer: Rowhammer Attacks over the Network and Defenses. USENIX ATC 2018: 213-226 - [c107]Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. USENIX Security Symposium 2018: 937-954 - [c106]Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. USENIX Security Symposium 2018: 955-972 - [p1]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Evaluating control-flow restricting defenses. The Continuing Arms Race 2018: 117-137 - [i2]Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser:
Benchmarking Crimes: An Emerging Threat in Systems Security. CoRR abs/1801.02381 (2018) - 2017
- [j21]Manolis Stamatogiannakis, Elias Athanasopoulos, Herbert Bos, Paul Groth:
PROV2R: Practical Provenance Analysis of Unstructured Processes. ACM Trans. Internet Techn. 17(4): 37:1-37:24 (2017) - [c105]Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida:
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. CCS 2017: 1675-1689 - [c104]Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz:
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. DSN 2017: 189-200 - [c103]Lucian Cojocar, Taddeus Kroes, Herbert Bos:
JTR: A Binary Solution for Switch-Case Recovery. ESSoS 2017: 177-195 - [c102]Lucian Cojocar, Kaveh Razavi, Herbert Bos:
Off-the-shelf Embedded Devices as Platforms for Security Research. EUROSEC 2017: 1:1-1:6 - [c101]Stephan van Schaik, Kaveh Razavi, Ben Gras, Herbert Bos, Cristiano Giuffrida:
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. EUROSEC 2017: 3:1-3:6 - [c100]Taddeus Kroes, Koen Koning, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
Fast and Generic Metadata Management with Mid-Fat Pointers. EUROSEC 2017: 9:1-9:6 - [c99]Dennis Andriesse, Asia Slowinska, Herbert Bos:
Compiler-Agnostic Function Detection in Binaries. EuroS&P 2017: 177-189 - [c98]Xi Chen, Herbert Bos, Cristiano Giuffrida:
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. EuroS&P 2017: 514-529 - [c97]Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, Elias Athanasopoulos:
No Need to Hide: Protecting Safe Regions on Commodity Hardware. EuroSys 2017: 437-452 - [c96]Thomas Rupprecht, Xi Chen, David H. White, Jan H. Boockmann, Gerald Lüttgen, Herbert Bos:
DSIbin: identifying dynamic data structures in C/C++ binaries. ASE 2017: 331-341 - [c95]Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos:
VUzzer: Application-aware Evolutionary Fuzzing. NDSS 2017 - [c94]Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida:
ASLR on the Line: Practical Cache Attacks on the MMU. NDSS 2017 - [c93]Alyssa Milburn, Herbert Bos, Cristiano Giuffrida:
Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. NDSS 2017 - [c92]Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida:
MARX: Uncovering Class Hierarchies in C++ Programs. NDSS 2017 - [c91]Marco Oliverio, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion. SOSP 2017: 531-545 - 2016
- [j20]Xi Chen, Asia Slowinska, Herbert Bos:
On the detection of custom memory allocators in C binaries. Empir. Softw. Eng. 21(3): 753-777 (2016) - [j19]István Haller, Asia Slowinska, Herbert Bos:
Scalable data structure detection and classification for C/C++ binaries. Empir. Softw. Eng. 21(3): 778-810 (2016) - [j18]Angelos Oikonomopoulos, Cristiano Giuffrida, Sanjay Rawat, Herbert Bos:
Binary Rejuvenation: Applications and Challenges. IEEE Secur. Priv. 14(1): 68-71 (2016) - [c90]István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
TypeSan: Practical Type Confusion Detection. CCS 2016: 517-528 - [c89]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c88]Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen:
POSTER: Identifying Dynamic Data Structures in Malware. CCS 2016: 1772-1774 - [c87]Tomás Hrubý, Cristiano Giuffrida, Lionel Sambuc, Herbert Bos, Andrew S. Tanenbaum:
A NEaT Design for Reliable and Scalable Network Stacks. CoNEXT 2016: 359-373 - [c86]Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew S. Tanenbaum, Herbert Bos, Cristiano Giuffrida:
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. DSN 2016: 25-36 - [c85]Koen Koning, Herbert Bos, Cristiano Giuffrida:
Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization. DSN 2016: 431-442 - [c84]Spandan Veggalam, Sanjay Rawat, István Haller, Herbert Bos:
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. ESORICS (1) 2016: 581-601 - [c83]István Haller, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos:
METAlloc: efficient and comprehensive metadata management for software security hardening. EUROSEC 2016: 5:1-5:6 - [c82]Radhesh Krishnan Konoth, Victor van der Veen, Herbert Bos:
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Financial Cryptography 2016: 405-421 - [c81]Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, Paul Groth:
Trade-Offs in Automatic Provenance Capture. IPAW 2016: 29-41 - [c80]Marieke Huisman, Herbert Bos, Sjaak Brinkkemper, Arie van Deursen, Jan Friso Groote, Patricia Lago, Jaco van de Pol, Eelco Visser:
Software that Meets Its Intent. ISoLA (2) 2016: 609-625 - [c79]Armando Miraglia, Dirk Vogt, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida:
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging. ISSRE 2016: 455-466 - [c78]Andrei Bacs, Cristiano Giuffrida, Bernhard Grill, Herbert Bos:
Slick: an intrusion detection system for virtualized storage devices. SAC 2016: 2033-2040 - [c77]Victor van der Veen, Enes Göktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, Cristiano Giuffrida:
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. IEEE Symposium on Security and Privacy 2016: 934-953 - [c76]Erik Bosman, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. IEEE Symposium on Security and Privacy 2016: 987-1004 - [c75]Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos:
Flip Feng Shui: Hammering a Needle in the Software Stack. USENIX Security Symposium 2016: 1-18 - [c74]Enes Göktas, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos:
Undermining Information Hiding (and What to Do about It). USENIX Security Symposium 2016: 105-119 - [c73]Angelos Oikonomopoulos, Elias Athanasopoulos, Herbert Bos, Cristiano Giuffrida:
Poking Holes in Information Hiding. USENIX Security Symposium 2016: 121-138 - [c72]Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos:
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. USENIX Security Symposium 2016: 583-600 - 2015
- [c71]Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti:
PIE: Parser Identification in Embedded Systems. ACSAC 2015: 251-260 - [c70]István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos:
ShrinkWrap: VTable Protection without Loose Ends. ACSAC 2015: 341-350 - [c69]Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida:
Practical Context-Sensitive CFI. CCS 2015: 927-940 - [c68]Matthias Neugschwandtner, Paolo Milani Comparetti, István Haller, Herbert Bos:
The BORG: Nanoprobing Binaries for Buffer Overreads. CODASPY 2015: 87-97 - [c67]Bernhard Grill, Andrei Bacs, Christian Platzer, Herbert Bos:
"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. DIMVA 2015: 25-45 - [c66]Dennis Andriesse, Herbert Bos, Asia Slowinska:
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. DSN 2015: 125-135 - [c65]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Lightweight Memory Checkpointing. DSN 2015: 474-484 - [c64]Dennis Andriesse, Christian Rossow, Herbert Bos:
Reliable Recon in Adversarial Peer-to-Peer Botnets. Internet Measurement Conference 2015: 129-140 - [c63]Dirk Vogt, Armando Miraglia, Georgios Portokalidis, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida:
Speculative Memory Checkpointing. Middleware 2015: 197-209 - [c62]Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. NDSS 2015 - [c61]Manolis Stamatogiannakis, Paul Groth, Herbert Bos:
Decoupling Provenance Capture and Analysis from Execution. TaPP 2015 - [e6]Herbert Bos, Fabian Monrose, Gregory Blanc:
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9404, Springer 2015, ISBN 978-3-319-26361-8 [contents] - 2014
- [j17]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Techniques for efficient in-memory checkpointing. ACM SIGOPS Oper. Syst. Rev. 48(1): 21-25 (2014) - [c60]Asia Slowinska, István Haller, Andrei Bacs, Silviu Baranga, Herbert Bos:
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables). DIMVA 2014: 1-20 - [c59]Dennis Andriesse, Herbert Bos:
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). DIMVA 2014: 41-50 - [c58]Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos:
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. DIMVA 2014: 92-111 - [c57]Arne Welzel, Christian Rossow, Herbert Bos:
On measuring the impact of DDoS botnets. EUROSEC 2014: 3:1-3:6 - [c56]Manolis Stamatogiannakis, Paul Groth, Herbert Bos:
Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation. IPAW 2014: 155-167 - [c55]Tomás Hrubý, Teodor Crivat, Herbert Bos, Andrew S. Tanenbaum:
On Sockets and System Calls: Minimizing Context Switches for the Socket API. TRIOS 2014 - [c54]Erik Bosman, Herbert Bos:
Framing Signals - A Return to Portable Shellcode. IEEE Symposium on Security and Privacy 2014: 243-258 - [c53]Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis:
Out of Control: Overcoming Control-Flow Integrity. IEEE Symposium on Security and Privacy 2014: 575-589 - [c52]Manolis Stamatogiannakis, Paul Groth, Herbert Bos:
Facilitating Trust on Data through Provenance. TRUST 2014: 220-221 - [c51]Enes Göktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis:
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. USENIX Security Symposium 2014: 417-432 - [e5]Dick C. A. Bulterman, Herbert Bos, Antony I. T. Rowstron, Peter Druschel:
Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands, April 13-16, 2014. ACM 2014, ISBN 978-1-4503-2704-6 [contents] - [e4]Angelos Stavrou, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4 [contents] - 2013
- [j16]István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities. login Usenix Mag. 38(6) (2013) - [c50]Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum:
Techniques for efficient in-memory checkpointing. HotDep 2013: 12:1-12:5 - [c49]Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos:
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. MALWARE 2013: 116-123 - [c48]Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos:
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. IEEE Symposium on Security and Privacy 2013: 97-111 - [c47]Tomás Hrubý, Herbert Bos, Andrew S. Tanenbaum:
When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems. USENIX ATC 2013: 255-266 - [c46]István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos:
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. USENIX Security Symposium 2013: 49-64 - [c45]Xi Chen, Asia Slowinska, Herbert Bos:
Who allocated my memory? Detecting custom memory allocators in C binaries. WCRE 2013: 22-31 - [c44]István Haller, Asia Slowinska, Herbert Bos:
MemPick: High-level data structure detection in C/C++ binaries. WCRE 2013: 32-41 - [c43]Xi Chen, Asia Slowinska, Herbert Bos:
MemBrush: A practical tool to detect custom memory allocators in C binaries. WCRE 2013: 477-478 - [c42]István Haller, Asia Slowinska, Herbert Bos:
MemPick: A tool for data structure detection. WCRE 2013: 479-480 - 2012
- [c41]Christian Rossow, Christian J. Dietrich, Herbert Bos:
Large-Scale Analysis of Malware Downloaders. DIMVA 2012: 42-61 - [c40]Andrei Bacs, Remco Vermeulen, Asia Slowinska, Herbert Bos:
System-Level Support for Intrusion Recovery. DIMVA 2012: 144-163 - [c39]Tomás Hrubý, Dirk Vogt, Herbert Bos, Andrew S. Tanenbaum:
Keep net working - on a dependable and fast networking stack. DSN 2012: 1-12 - [c38]Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos:
Memory Errors: The Past, the Present, and the Future. RAID 2012: 86-106 - [c37]Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, Maarten van Steen:
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. IEEE Symposium on Security and Privacy 2012: 65-79 - [c36]Asia Slowinska, Traian Stancescu, Herbert Bos:
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. USENIX ATC 2012: 125-137 - [e3]Pascal Felber, Frank Bellosa, Herbert Bos:
European Conference on Computer Systems, Proceedings of the Seventh EuroSys Conference 2012, EuroSys '12, Bern, Switzerland, April 10-13, 2012. ACM 2012, ISBN 978-1-4503-1223-3 [contents] - [i1]Evangelos P. Markatos, Herbert Bos:
SysSec: Managing Threats and Vulnerabilities in the Future Internet. ERCIM News 2012(90) (2012) - 2011
- [j15]Willem de Bruijn, Herbert Bos, Henri E. Bal:
Application-Tailored I/O with Streamline. ACM Trans. Comput. Syst. 29(2): 6:1-6:33 (2011) - [c35]Christian Rossow, Christian J. Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten van Steen, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c34]Herbert Bos, Lorenzo Cavallaro, Andrew S. Tanenbaum:
Systems Security at VU University Amsterdam. SysSec@DIMVA 2011: 111-114 - [c33]Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann:
On Botnets That Use DNS for Command and Control. EC2ND 2011: 9-16 - [c32]Asia Slowinska, Traian Stancescu, Herbert Bos:
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. NDSS 2011 - [c31]Erik Bosman, Asia Slowinska, Herbert Bos:
Minemu: The World's Fastest Taint Tracker. RAID 2011: 1-20 - [e2]Thorsten Holz, Herbert Bos:
Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Lecture Notes in Computer Science 6739, Springer 2011, ISBN 978-3-642-22423-2 [contents] - 2010
- [j14]Asia Slowinska, Herbert Bos:
Pointer tainting still pointless: (but we all see the point of tainting). ACM SIGOPS Oper. Syst. Rev. 44(3): 88-92 (2010) - [j13]Andrew S. Tanenbaum, Raja Appuswamy, Herbert Bos, Lorenzo Cavallaro, Cristiano Giuffrida, Tomás Hrubý, Jorrit N. Herder, Erik van der Kouwe, David C. van Moolenbroek:
MINIX 3: Status Report and Current Research. login Usenix Mag. 35(3) (2010) - [c30]Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos:
Paranoid Android: versatile protection for smartphones. ACSAC 2010: 347-356 - [c29]Stefan Vijzelaar, Herbert Bos, Wan J. Fokkink:
Brief announcement: a shared disk on distributed storage. PODC 2010: 79-80 - [c28]Asia Slowinska, Traian Stancescu, Herbert Bos:
DDE: dynamic data structure excavation. ApSys 2010: 13-18
2000 – 2009
- 2009
- [c27]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Fault isolation for device drivers. DSN 2009: 33-42 - [c26]Asia Slowinska, Herbert Bos:
Pointless tainting?: evaluating the practicality of pointer tainting. EuroSys 2009: 61-74 - [c25]Maik Nijhuis, Herbert Bos, Henri E. Bal, Cédric Augonnet:
Mapping and Synchronizing Streaming Applications on Cell Processors. HiPEAC 2009: 216-230 - 2008
- [j12]Herbert Bos, Bart Samwel, Mihai-Lucian Cristea, Kostas Anagnostakis:
Safe execution of untrusted applications on embedded network processors. Int. J. Embed. Syst. 3(4): 294-303 (2008) - [j11]Willem de Bruijn, Herbert Bos:
PipesFS: fast Linux I/O in the unix tradition. ACM SIGOPS Oper. Syst. Rev. 42(5): 55-63 (2008) - [c24]Georgios Portokalidis, Herbert Bos:
Eudaemon: involuntary and on-demand emulation against zero-day exploits. EuroSys 2008: 287-299 - [c23]Willem de Bruijn, Herbert Bos:
Beltway Buffers: Avoiding the OS Traffic Jam. INFOCOM 2008: 136-140 - [c22]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability). PRDC 2008: 112-121 - [e1]Herbert Bos, Evangelos P. Markatos:
Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008. ACM 2008, ISBN 978-1-60558-119-4 [contents] - 2007
- [j10]Georgios Portokalidis, Herbert Bos:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Comput. Networks 51(5): 1256-1274 (2007) - [j9]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Roadmap to a Failure-Resilient Operating System. login Usenix Mag. 32(1) (2007) - [c21]Asia Slowinska, Herbert Bos:
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. ACSAC 2007: 487-500 - [c20]Tomás Hrubý, Kees van Reeuwijk, Herbert Bos:
Ruler: high-speed packet matching and rewriting on NPUs. ANCS 2007: 1-10 - [c19]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Failure Resilience for Device Drivers. DSN 2007: 41-50 - [c18]Maik Nijhuis, Herbert Bos, Henri E. Bal:
A Component-based Coordination Language for Efficient Reconfigurable Streaming Applications. ICPP 2007: 60 - [c17]Mihai-Lucian Cristea, Leon Gommans, Li Xu, Herbert Bos:
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Networking 2007: 945-957 - 2006
- [j8]Herbert Bos, Bart Samwel, Ilja Booij:
Dynamically extending the Corral with native code for high-speed packet processing. Comput. Networks 50(14): 2444-2461 (2006) - [j7]Andrew S. Tanenbaum, Jorrit N. Herder, Herbert Bos:
Can We Make Operating Systems Reliable and Secure? Computer 39(5): 44-51 (2006) - [j6]Andrew S. Tanenbaum, Jorrit N. Herder, Herbert Bos:
File size distribution on UNIX systems: then and now. ACM SIGOPS Oper. Syst. Rev. 40(1): 100-104 (2006) - [j5]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
MINIX 3: a highly reliable, self-repairing operating system. ACM SIGOPS Oper. Syst. Rev. 40(3): 80-89 (2006) - [j4]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Modular System Programming in MINIX 3. login Usenix Mag. 31(2) (2006) - [c16]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Reorganizing UNIX for Reliability. Asia-Pacific Computer Systems Architecture Conference 2006: 81-94 - [c15]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Construction of a Highly Dependable Operating System. EDCC 2006: 3-12 - [c14]Maik Nijhuis, Herbert Bos, Henri E. Bal:
Supporting Reconfigurable Parallel Multimedia Applications. Euro-Par 2006: 765-776 - [c13]Georgios Portokalidis, Asia Slowinska, Herbert Bos:
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. EuroSys 2006: 15-27 - [c12]Ana Lucia Varbanescu, Maik Nijhuis, Arturo González-Escribano, Henk J. Sips, Herbert Bos, Henri E. Bal:
SP@CE - An SP-Based Programming Model for Consumer Electronics Streaming Applications. LCPC 2006: 33-48 - [c11]Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos:
SafeCard: A Gigabit IPS on the Network Card. RAID 2006: 311-330 - 2005
- [c10]Mihai-Lucian Cristea, Willem de Bruijn, Herbert Bos:
FPL-3: Towards Language Support for Distributed Packet Processing. NETWORKING 2005: 743-755 - [c9]Herbert Bos, Kaiming Huang:
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. RAID 2005: 102-123 - [c8]Mihai-Lucian Cristea, Claudiu Zissulescu, Ed F. Deprettere, Herbert Bos:
FPL-3E: Towards Language Support for Reconfigurable Packet Processing. SAMOS 2005: 82-92 - [c7]Willem de Bruijn, Herbert Bos, Henri E. Bal:
Robust Distributed Systems Achieving Self-Management through Inference. WOWMOM 2005: 542-546 - 2004
- [c6]Willem de Bruijn, Jon T. Moore, Herbert Bos:
Splash: SNMP Plus a Lightweight API for SNAP Handling. NOMS (1) 2004: 743-756 - [c5]Herbert Bos, Willem de Bruijn, Mihai-Lucian Cristea, Trung Nguyen, Georgios Portokalidis:
FFPF: Fairly Fast Packet Filters. OSDI 2004: 347-363 - 2003
- [c4]Herbert Bos, Bart Samwel:
HOKES/POKES: Light-Weight Resource Sharing. EMSOFT 2003: 51-66 - [c3]Jan Coppens, Steven Van den Berghe, Herbert Bos, Evangelos P. Markatos, Filip De Turck, Arne Øslebø, Sven Ubik:
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. MMNS 2003: 475-487 - 2002
- [j3]Simon Crosby, Sean Rooney, Rebecca Isaacs, Herbert Bos:
A perspective on how ATM lost control. Comput. Commun. Rev. 32(5): 25-28 (2002) - [c2]Herbert Bos, Bart Samwel:
The OKE Corral: Code Organisation and Reconfiguration at Runtime Using Active Linking. IWAN 2002: 32-47 - 2000
- [j2]Herbert Bos:
Open Extensible Network Control. J. Netw. Syst. Manag. 8(1): 73-97 (2000)
1990 – 1999
- 1999
- [c1]Herbert Bos:
Application-Specific Policies: Beyond the Domain Boundaries. Integrated Network Management 1999: 827-840 - 1998
- [j1]Herbert Bos:
Efficient reservations in open ATM network control using on-line measurements. Int. J. Commun. Syst. 11(4): 247-258 (1998)
Coauthor Index
aka: Andy Tanenbaum
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint