Seguir
Lucas Vincenzo Davi
Título
Citado por
Citado por
Año
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8482010
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
7852013
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
International Conference on Information Security, 346-360, 2010
6942010
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
Network and Distributed Systems Security Symposium (NDSS), 2012
5822012
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
5422015
Counterfeit object-oriented programming
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
IEEE S&P, 2015
542*2015
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
L Davi, AR Sadeghi, D Lehmann, F Monrose
23rd USENIX Security Symposium (USENIX Security 14), 401-416, 2014
4912014
The Cybersecurity Landscape in Industrial Control Systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
4422016
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4272011
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
4192011
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3812016
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
M Rodler, W Li, GO Karame, L Davi
arXiv preprint arXiv:1812.05934, 2018
3362018
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
IEEE Symposium on Security and Privacy, S&P 15, 2015
3362015
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2822011
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 74, 2015
2562015
Hafix: Hardware-assisted flow integrity extension
O Arias, L Davi, M Hanreich, Y Jin, P Koeberl, D Paul, AR Sadeghi, ...
52nd Design Automation Conference (DAC), 2015
256*2015
Isomeron: Code randomization resilient to (just-in-time) return-oriented programming
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
Proc. 22nd Network and Distributed Systems Security Sym.(NDSS), 2015
2542015
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
Network and Distributed Systems Security Symposium (NDSS) 26, 27-40, 2012
2492012
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
2432009
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2212015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20