TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 8.

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza :
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018
[Konferenz- oder Workshop-Beitrag] , (2018)

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza :
K-Miner: Uncovering Memory Corruption in Linux.
25th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2018)

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
24th ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
[Online-Edition: https://arxiv.org/abs/1611.08396]
In: Cryptography and Security
[Artikel] , (2016)

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg :
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP) pp. 413-430.
[Artikel] , (2015)

Diese Liste wurde am Sat Dec 8 03:16:24 2018 CET generiert.