Seguir
Lucas Vincenzo Davi
Título
Citado por
Citado por
Año
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8262010
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
7532013
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
International Conference on Information Security, 346-360, 2010
6812010
Towards Taming Privilege-Escalation Attacks on Android.
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi, B Shastry
Network and Distributed Systems Security Symposium (NDSS), 2012
5742012
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
5172015
Counterfeit object-oriented programming
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
IEEE S&P, 2015
517*2015
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
L Davi, AR Sadeghi, D Lehmann, F Monrose
23rd USENIX Security Symposium (USENIX Security 14), 401-416, 2014
4782014
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4182011
The Cybersecurity Landscape in Industrial Control Systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
4152016
Xmandroid: A new android evolution to mitigate privilege escalation attacks
S Bugiel, L Davi, A Dmitrienko, T Fischer, AR Sadeghi
Technische Universität Darmstadt, Technical Report TR-2011-04, 2011
4132011
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3542016
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
IEEE Symposium on Security and Privacy, S&P 15, 2015
3272015
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks
M Rodler, W Li, GO Karame, L Davi
arXiv preprint arXiv:1812.05934, 2018
2982018
Practical and lightweight domain isolation on android
S Bugiel, L Davi, A Dmitrienko, S Heuser, AR Sadeghi, B Shastry
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
2822011
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
L Davi, A Dmitrienko, M Egele, T Fischer, T Holz, R Hund, S Nürnberger, ...
Network and Distributed Systems Security Symposium (NDSS) 26, 27-40, 2012
2482012
Isomeron: Code randomization resilient to (just-in-time) return-oriented programming
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
Proc. 22nd Network and Distributed Systems Security Sym.(NDSS), 2015
2462015
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 74, 2015
2442015
Hafix: Hardware-assisted flow integrity extension
O Arias, L Davi, M Hanreich, Y Jin, P Koeberl, D Paul, AR Sadeghi, ...
52nd Design Automation Conference (DAC), 2015
244*2015
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
2402009
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2142015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20