Follow
Herbert Bos
Herbert Bos
Professor of Computer Science, Vrije Universiteit Amsterdam
Verified email at cs.vu.nl - Homepage
Title
Cited by
Cited by
Year
Modern Operating Systems
AS Tanenbaum, H Bos
Pearson, 2013
54462013
Vuzzer: Application-aware evolutionary fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
6182017
Paranoid android: versatile protection for smartphones
G Portokalidis, P Homburg, K Anagnostakis, H Bos
Proceedings of the 26th annual computer security applications conference …, 2010
5382010
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
G Portokalidis, A Slowinska, H Bos
ACM SIGOPS Operating Systems Review 40 (4), 15-27, 2006
4742006
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
3952014
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
3172019
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3142016
Can we make operating systems reliable and secure?
AS Tanenbaum, JN Herder, H Bos
Computer 39 (5), 44-51, 2006
3102006
Dowsing for overflows: a guided fuzzer to find buffer boundary violations.
I Haller, A Slowinska, M Neugschwandtner, H Bos
USENIX Security Symposium, 49-64, 2013
3062013
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2812015
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
B Gras, K Razavi, H Bos, C Giuffrida
USENIX Security Symposium 216, 2018
2632018
Prudent practices for designing malware experiments: Status quo and outlook
C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ...
2012 IEEE symposium on security and privacy, 65-79, 2012
2622012
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
2512017
Flip Feng Shui: Hammering a Needle in the Software Stack.
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
USENIX Security symposium 25, 1-18, 2016
2362016
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE symposium on security and privacy, 97-111, 2013
2292013
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
A Slowinska, T Stancescu, H Bos
NDSS, 2011
2222011
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
2202016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
2162016
Memory errors: The past, the present, and the future
V Van der Veen, N Dutt-Sharma, L Cavallaro, H Bos
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
2102012
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard
EGEAMPHBG Portokalidis
USENIX Security, 2014
207*2014
The system can't perform the operation now. Try again later.
Articles 1–20