SoK: Automated Software Diversity P Larsen, A Homescu, S Brunthaler, M Franz 35th IEEE Symposium on Security and Privacy, 2014 | 490 | 2014 |
Readactor: Practical code randomization resilient to memory disclosure S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... 2015 IEEE Symposium on Security and Privacy, 763-780, 2015 | 326 | 2015 |
Thwarting cache side-channel attacks through dynamic software diversity. S Crane, A Homescu, S Brunthaler, P Larsen, M Franz NDSS, 8-11, 2015 | 204 | 2015 |
Profile-guided automated software diversity A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013 | 191 | 2013 |
Compiler-generated software diversity T Jackson, B Salamat, A Homescu, K Manivannan, G Wagner, A Gal, ... Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 77-98, 2011 | 146 | 2011 |
Librando: transparent code randomization for just-in-time compilers A Homescu, S Brunthaler, P Larsen, M Franz Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013 | 113 | 2013 |
Microgadgets: size does matter in turing-complete return-oriented programming A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz Proceedings of the 6th USENIX Workshop on Offensive Technologies, 7-7, 2012 | 96 | 2012 |
Secure and efficient application monitoring and replication S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ... 2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016 | 79 | 2016 |
Diversifying the software stack using randomized NOP insertion T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz Moving Target Defense II: Application of Game Theory and Adversarial …, 2013 | 70 | 2013 |
Selfrando: Securing the Tor browser against de-anonymization exploits M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ... Proceedings on Privacy Enhancing Technologies 2016 (4), 454-469, 2016 | 61 | 2016 |
Large-scale automated software diversity—program evolution redux A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015 | 47 | 2015 |
{Subversive-C}: Abusing and protecting dynamic message dispatch J Lettner, B Kollenda, A Homescu, P Larsen, F Schuster, L Davi, ... 2016 USENIX Annual Technical Conference (USENIX ATC 16), 209-221, 2016 | 30 | 2016 |
Code randomization for just-in-time compilers M Franz, A Homescu, S Brunthaler, P Larsen US Patent 9,250,937, 2016 | 25 | 2016 |
HappyJIT: a tracing JIT compiler for PHP A Homescu, A Şuhan Proceedings of the 7th Symposium on Dynamic Languages, 25-36, 2011 | 24 | 2011 |
Code randomization: Haven’t we solved this problem yet? S Crane, A Homescu, P Larsen 2016 IEEE Cybersecurity Development (SecDev), 124-129, 2016 | 23 | 2016 |
Return to where? You can’t exploit what you can’t find S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ... Proceedings of Black Hat USA, 2015 | 3 | 2015 |
Encaching and sharing transformed libraries SJ Crane, A Homescu US Patent 11,340,915, 2022 | | 2022 |
Software diversification in external contexts A Homescu, SJ Crane, P Larsen US Patent 10,303,861, 2019 | | 2019 |
Diversity and information leaks S Crane, A Homescu, P Larsen, H Okhravi, M Franz The Continuing Arms Race: Code-Reuse Attacks and Defenses, 61-79, 2018 | | 2018 |
The Continuing Arms Race: Code-Reuse Attacks and Defenses S Crane, A Homescu, P Larsen, H Okhravi, M Franz, ... | | 2018 |