Publications

  2017 (21)
DSIbin: Identifying Dynamic Data Structures in C/C++ Binaries. Ruprecht, T.; Chen, X.; White, D.; Bockmann, J.; Luettgen, G.; and Bos, H. In ASE, October 2017.
bibtex
Secure Page Fusion with VUsion. Oliverio, M.; Razavi, K.; Bos, H.; and Giuffrida, C. In SOSP, October 2017.
Secure Page Fusion with VUsion [pdf]Paper   bibtex
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. van der Veen, V.; Andriesse, D.; Stamatogiannakis, M.; Chen, X.; Bos, H.; and Giuffrida, C. In CCS, October 2017.
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [pdf]Paper   bibtex   abstract
Understanding Rack-Scale Disaggregated Storage. Legtchenko, S.; Williams, H.; Razavi, K.; Donnelly, A.; Black, R.; Douglas, A.; Cheriere, N.; Fryer, D.; Mast, K.; Brown, A. D.; Klimovic, A.; Slowey, A.; and Rowstron, A. In HotStorage, July 2017.
Understanding Rack-Scale Disaggregated Storage [pdf]Paper   bibtex
Analyzing and securing binaries through static disassembly. Andriesse, D. Ph.D. Thesis, Vrije Universiteit Amsterdam, June 2017.
bibtex
Towards Automated Discovery of Crash-Resistant Primitives in Binaries. Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T. In DSN, June 2017.
Towards Automated Discovery of Crash-Resistant Primitives in Binaries [pdf]Paper   bibtex
Using run-time randomization against memory corruption attacks on legacy binaries. Chen, X. Ph.D. Thesis, Vrije Universiteit Amsterdam, May 2017.
bibtex
Adapting software testing techniques to enhance system security. Haller, I. Ph.D. Thesis, Vrije Universiteit Amsterdam, April 2017.
bibtex
Fast and Generic Metadata Management with Mid-Fat Pointers. Kroes, T.; Koning, K.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In EuroSec, April 2017.
Fast and Generic Metadata Management with Mid-Fat Pointers [pdf]Paper   bibtex
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. In EuroSec, April 2017.
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [pdf]Paper   bibtex
Off-the-shelf Embedded Devices As Platforms for Security Research. Cojocar, L.; Razavi, K.; and Bos, H. In EuroSec, April 2017.
bibtex
No Need to Hide: Protecting Safe Regions on Commodity Hardware. Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E. In EuroSys, April 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware [pdf]Paper   bibtex
DangSan: Scalable Use-after-free Detection. van der Kouwe, E.; Nigade, V.; and Giuffrida, C. In EuroSys, April 2017.
DangSan: Scalable Use-after-free Detection [pdf]Paper   bibtex
Compiler-Agnostic Function Detection in Binaries. Andriesse, D.; Slowinska, A.; and Bos, H. In EuroS&P, April 2017.
Compiler-Agnostic Function Detection in Binaries [pdf]Paper   bibtex
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Chen, X.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2017.
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks [pdf]Paper   bibtex
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. Technical Report IR-CS-51, Vrije Universiteit Amsterdam, February 2017.
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU [pdf]Paper   bibtex
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   bibtex
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Milburn, A.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [pdf]Paper   bibtex
MARX: Uncovering Class Hierarchies in C++ Programs. Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C. In NDSS, February 2017.
MARX: Uncovering Class Hierarchies in C++ Programs [pdf]Paper   bibtex
VUzzer: Application-aware Evolutionary Fuzzing. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H. In NDSS, February 2017.
VUzzer: Application-aware Evolutionary Fuzzing [pdf]Paper   bibtex
Off-the-shelf Embedded Devices as Platforms for Security Research. Cojocar, L.; Razavi, K.; and Bos, H. In Proceedings of the 10th European Workshop on Systems Security, pages 1, 2017. ACM 00000
bibtex
  2016 (27)
VTPin: Practical VTable Hijacking Protection for Binaries. Sarbinowski, P.; Kemerlis, V. P.; Giuffrida, C.; and Athanasopoulos, E. In ACSAC, December 2016.
VTPin: Practical VTable Hijacking Protection for Binaries [pdf]Paper   bibtex
A NEaT Design for Reliable and Scalable Network Stacks. Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S. In CoNext, December 2016.
A NEaT Design for Reliable and Scalable Network Stacks [pdf]Paper   bibtex
Bypassing Clang's SafeStack for Fun and Profit. Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Bypassing Clang's SafeStack for Fun and Profit [pdf]Paper   bibtex
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Paper   bibtex
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging. Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C. In ISSRE, October 2016.
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [pdf]Paper   bibtex
TypeSan: Practical Type Confusion Detection. Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In CCS, October 2016.
TypeSan: Practical Type Confusion Detection [pdf]Paper   bibtex
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C. In CCS, October 2016.
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   bibtex
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming. Veggalam, S.; Rawat, S.; Haller, I.; and Bos, H. In ESORICS, September 2016.
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming [pdf]Paper   doi   bibtex
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016.
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   bibtex
Undermining Information Hiding (And What to do About it). Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016.
Undermining Information Hiding (And What to do About it) [pdf]Paper   bibtex
Poking Holes in Information Hiding. Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2016.
Poking Holes in Information Hiding [pdf]Paper   bibtex
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H. In USENIX Security, August 2016.
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries [pdf]Paper   bibtex
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, July 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Paper   bibtex
Trade-offs in Automatic Provenance Capture. Stamatogiannakis, M.; Kazmi, H.; Sharif, H.; Vermeulen, R.; Gehani, A.; Bos, H.; and Groth, P. In IPAW, June 2016.
Trade-offs in Automatic Provenance Capture [link]Paper   bibtex
HSFI: Representative Fault Injection Scalable to Large Code Bases. Kouwe, E. v. d.; and Tanenbaum, A. S. In DSN, June 2016.
HSFI: Representative Fault Injection Scalable to Large Code Bases [pdf]Paper   bibtex
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. Koning, K.; Bos, H.; and Giuffrida, C. In DSN, June 2016.
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [pdf]Paper   bibtex
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In DSN, June 2016.
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [pdf]Paper   bibtex
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2016.
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   bibtex
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C. In S&P, May 2016.
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [pdf]Paper   bibtex
Slick: An Intrusion Detection System for Virtualized Storage Devices. Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H. In SAC, April 2016.
Slick: An Intrusion Detection System for Virtualized Storage Devices [pdf]Paper   bibtex
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening. Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2016.
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening [pdf]Paper   bibtex
Toward Large-Scale Vulnerability Discovery Using Machine Learning. Grieco, G.; Grinblat, G. L.; Uzal, L.; Rawat, S.; Feist, J.; and Mounier, L. In CODASPY, March 2016.
Toward Large-Scale Vulnerability Discovery Using Machine Learning [pdf]Paper   bibtex
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. Stanciu, V.; Spolaor, R.; Conti, M.; and Giuffrida, C. In CODASPY, March 2016.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks [pdf]Paper   bibtex
DroydSeuss: A Mobile Banking Trojan Tracker. Coletta, A.; van der Veen, V.; and Maggi, F. In FC, February 2016.
DroydSeuss: A Mobile Banking Trojan Tracker [pdf]Paper   bibtex
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Konoth, R. K.; van der Veen, V.; and Bos, H. In FC, February 2016.
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [pdf]Paper   bibtex
Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. TSE, . January 2016.
Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Binary Rejuvenation: Applications and Challenges. Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H. IEEE S&P Magazine, 14(1). January 2016.
Binary Rejuvenation: Applications and Challenges [pdf]Paper   bibtex
  2015 (19)
Practical Context-Sensitive CFI. van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C. In CCS, November 2015.
Practical Context-Sensitive CFI [pdf]Paper   bibtex
R2C2: A Network Stack for Rack-scale Computers. Costa, P.; Ballani, H.; Razavi, K.; and Kash, I. In SIGCOMM, November 2015.
R2C2: A Network Stack for Rack-scale Computers [pdf]Paper   bibtex
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C. In NDSS, November 2015.
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries [pdf]Paper   bibtex
ShrinkWrap: VTable Protection Without Loose Ends. Haller, I.; Goktas, E.; Athanasopoulos, E.; Portokalidis, G.; and Bos, H. In ACSAC, October 2015.
ShrinkWrap: VTable Protection Without Loose Ends [pdf]Paper   bibtex
Speculative Memory Checkpointing. Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In Middleware, October 2015.
Speculative Memory Checkpointing [pdf]Paper   bibtex
CAIN: Silently Breaking ASLR in the Cloud. Barresi, A.; Razavi, K.; Payer, M.; and Gross, T. R. In WOOT, October 2015.
CAIN: Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
Decoupling Provenance Capture and Analysis from Execution. Stamatogiannakis, M.; Groth, P.; and Bos, H. In TaPP, October 2015.
Decoupling Provenance Capture and Analysis from Execution [link]Paper   bibtex
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds. Razavi, K.; Kolk, G. V. D.; and Kielmann, T. In ICDCS, October 2015.
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds [pdf]Paper   bibtex
Reliable Recon in Adversarial Peer-to-Peer Botnets. Andriesse, D.; Rossow, C.; and Bos, H. In IMC, October 2015.
Reliable Recon in Adversarial Peer-to-Peer Botnets [pdf]Paper   bibtex
PIE: Parser Identification in Embedded Systems. Cojocar, L.; Zaddach, J.; Verdult, R.; Bos, H.; Balzarotti, D.; and Francillon, A. In ACSAC, October 2015.
PIE: Parser Identification in Embedded Systems [pdf]Paper   bibtex
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. Andriesse, D.; Bos, H.; and Slowinska, A. In DSN, October 2015.
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming [pdf]Paper   bibtex
Lightweight Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2015.
Lightweight Memory Checkpointing [pdf]Paper   bibtex
Scaling VM Deployment in an Open Source Cloud Stack. Razavi, K.; Costache, S.; Gardiman, A.; Verstoep, K.; and Kielmann, T. In ScienceCloud, September 2015.
Scaling VM Deployment in an Open Source Cloud Stack [pdf]Paper   bibtex
A Methodology to Efficiently Compare Operating System Stability. van der Kouwe, E.; Giuffrida, C.; Ghituletez, R.; and Tanenbaum, A. In HASE, September 2015.
A Methodology to Efficiently Compare Operating System Stability [pdf]Paper   bibtex
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Grill, B.; Bacs, A.; Platzer, C.; and Bos, H. In DIMVA, September 2015.
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them [pdf]Paper   bibtex
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure. Razavi, K.; Ion, A.; Tato, G.; Jeong, K.; Figueiredo, R.; Pierre, G.; and Kielmann, T. In IC2E, September 2015.
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure [pdf]Paper   bibtex
The BORG: Nanoprobing Binaries for Buffer Overreads. Neugschwandtner, M.; Milani Comparetti, P.; Haller, I.; and Bos, H. In CODASPY, September 2015.
The BORG: Nanoprobing Binaries for Buffer Overreads [pdf]Paper   bibtex
Fast and Scalable Virtual Machine Deployment. Razavi, K. Ph.D. Thesis, Vrije Universiteit Amsterdam, August 2015.
bibtex
Silently Breaking ASLR in the Cloud. Barresi, A.; and Razavi, K. In Black Hat Europe, August 2015.
Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
  2014 (21)
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. Goktas, E.; Athanasopoulos, E.; Polychronakis, M.; Bos, H.; and Portokalidis, G. In USENIX Security, December 2014.
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard [pdf]Paper   bibtex
Out Of Control: Overcoming Control-Flow Integrity. Goktas, E.; Athanasopoulos, E.; Bos, H.; and Portokalidis, G. In S&P, December 2014.
Out Of Control: Overcoming Control-Flow Integrity [pdf]Paper   bibtex
Framing signals - Return to portable exploits. Bosman, E.; and Bos, H. In S&P, December 2014.
Framing signals - Return to portable exploits [pdf]Paper   bibtex
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes. Razavi, K.; Ion, A.; and Kielmann, T. In HPDC, of HPDC '14, October 2014.
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes [pdf]Paper   bibtex
On Sockets and System Calls: Minimizing Context Switches for the Socket API. Hruby, T.; Crivat, T.; Bos, H.; and Tanenbaum, A. S. In TRIOS, October 2014.
On Sockets and System Calls: Minimizing Context Switches for the Socket API [pdf]Paper   bibtex
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. In Middleware, October 2014.
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. SQL, 24(1). September 2014.
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments [link]Paper   bibtex
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In CODASPY, September 2014.
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection [pdf]Paper   bibtex
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. Rawat, S.; Mounier, L.; and Potet, M. In ARES, September 2014.
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis [pdf]Paper   bibtex
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Giuffrida, C.; Majdanik, K.; Conti, M.; and Bos, H. In DIMVA, September 2014.
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [pdf]Paper   bibtex
Evaluating Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. In HASE, September 2014.
Evaluating Distortion in Fault Injection Experiments [pdf]Paper   bibtex
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables). Slowinska, A.; Haller, I.; Bacs, A.; Baranga, S.; and Bos, H. In DIMVA, September 2014.
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables) [pdf]Paper   bibtex
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation. Stamatogiannakis, M.; Groth, P.; and Bos, H. In IPAW, September 2014.
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation [pdf]Paper   bibtex
Towards Optimal Scheduling of Multiserver System Components. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In MOS, September 2014.
Towards Optimal Scheduling of Multiserver System Components [pdf]Paper   bibtex
On measuring the impact of DDoS botnets. Welzel, A.; Rossow, C.; and Bos, H. In EuroSec, September 2014.
On measuring the impact of DDoS botnets [pdf]Paper   bibtex
Enter Sandbox: Android Sandbox Comparison. Neuner, S.; van der Veen, V.; Lindorfer, M.; Huber, M.; Merzdovnik, G.; Mulazzani, M.; and Weippl, E. In MoST, September 2014.
Enter Sandbox: Android Sandbox Comparison [pdf]Paper   bibtex
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. Lindorfer, M.; Neugschwandtner, M.; Weichselbaum, L.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. In BADGERS, September 2014.
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors [pdf]Paper   bibtex
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. In EDCC, September 2014.
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments [pdf]Paper   bibtex
Instruction-Level Steganography for Covert Trigger-Based Malware. Andriesse, D.; and Bos, H. In DIMVA, September 2014.
Instruction-Level Steganography for Covert Trigger-Based Malware [pdf]Paper   bibtex
Safe and Automatic Live Update. Giuffrida, C. Ph.D. Thesis, VU Amsterdam, August 2014.
Safe and Automatic Live Update [pdf]Paper   bibtex
Andrubis: Android Malware under the Magnifying Glass. Weichselbaum, L.; Neugschwandtner, M.; Lindorfer, M.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. Technical Report August 2014.
Andrubis: Android Malware under the Magnifying Glass [pdf]Paper   bibtex
  2013 (22)
Safe and Automatic Live Update for Operating Systems. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In ASPLOS, December 2013.
Safe and Automatic Live Update for Operating Systems [pdf]Paper   bibtex
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H. In USENIX Security, December 2013.
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations [pdf]Paper   bibtex
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Rossow, C.; Andriesse, D.; Werner, T.; Stone-Gross, B.; Dietrich, C. J.; and Bos, H. In S&P, December 2013.
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets [pdf]Paper   bibtex
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In USENIX ATC, November 2013.
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems [pdf]Paper   bibtex
Scalable Virtual Machine Deployment Using VM Image Caches. Razavi, K.; and Kielmann, T. In SC, October 2013.
Scalable Virtual Machine Deployment Using VM Image Caches [pdf]Paper   bibtex
Practical Automated Vulnerability Monitoring Using Program State Invariants. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S. In DSN, October 2013.
Practical Automated Vulnerability Monitoring Using Program State Invariants [pdf]Paper   bibtex
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. Giuffrida, C.; Iorgulescu, C.; Kuijsten, A.; and Tanenbaum, A. S. In LISA, October 2013.
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer [pdf]Paper   bibtex
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Razavi, K.; Razorea, L. M.; and Kielmann, T. In DIHC, September 2013.
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation [pdf]Paper   bibtex
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In WCRE, September 2013.
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection [pdf]Paper   bibtex
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming. Rawat, S.; Duchene, F.; Groz, R.; and Richier, J. In CICS, September 2013.
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming [link]Paper   bibtex
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Grieco, G.; Mounier, L.; Potet, M.; and Rawat, S. In ICSTW, September 2013.
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis [pdf]Paper   bibtex
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In PRDC, September 2013.
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments [pdf]Paper   bibtex
Unprivileged Black-Box Detection of User-Space Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. TDSC, 10(1). September 2013.
Unprivileged Black-Box Detection of User-Space Keyloggers [pdf]Paper   bibtex
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries. Chen, X.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries [pdf]Paper   bibtex
MemPick: Data Structure Detection in C/C++ Binaries. Haller, I.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
MemPick: Data Structure Detection in C/C++ Binaries [pdf]Paper   bibtex
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. Andriesse, D.; Rossow, C.; Stone-Gross, B.; Plohmann, D.; and Bos, H. In MALWARE, September 2013.
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus [pdf]Paper   bibtex
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   bibtex
Combining Static and Dynamic Analysis for Vulnerability Detection. Rawat, S.; Ceara, D.; Mounier, L.; and Potet, M. Technical Report August 2013.
Combining Static and Dynamic Analysis for Vulnerability Detection [link]Paper   bibtex
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz. Duchene, F.; Rawat, S.; Richier, J.; Groz, R.; and others In SSTIC, August 2013.
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz [link]Paper   bibtex
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In NSC, August 2013.
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering [link]Paper   bibtex
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications. Pierre, G.; Kielmann, T.; Rocca, E.; Razavi, K; IJff, B.; Fernandez, H.; Figueiredo, R.; Uta, A.; Vintila, A.; Oprescu, A.; Schuett, T.; Berlin, M.; Artac, M.; and Cernivec, A. In HPDC (poster), August 2013.
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications [pdf]Paper   bibtex
Dynamic Analysis of Android Malware. van der Veen, V.; Bos, H.; and Rossow, C. Ph.D. Thesis, August 2013.
Dynamic Analysis of Android Malware [pdf]Paper   bibtex
  2012 (10)
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In USENIX Security, December 2012.
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [pdf]Paper   bibtex
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Rossow, C.; Dietrich, C. J.; Grier, C.; Kreibich†, C.; Paxson†, V.; Pohlmann, N.; Bos, H.; and Steen, M. v. In S&P, December 2012.
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook [pdf]Paper   bibtex
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Slowinska, A.; Stancescu, T.; and Bos, H. In USENIX ATC, November 2012.
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation [pdf]Paper   bibtex
Memory Errors: The Past, the Present, and the Future. van der Veen, V.; Dutt-Sharma, N.; Cavallaro, L.; and Bos, H. In RAID, October 2012.
Memory Errors: The Past, the Present, and the Future [pdf]Paper   bibtex
Keep Net Working - On a Dependable and Fast Networking Stack. Hruby, T.; Vogt, D.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2012.
Keep Net Working - On a Dependable and Fast Networking Stack [pdf]Paper   bibtex
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. Duchene, F.; Groz, R.; Rawat, S.; and Richier, J. In ICST, September 2012.
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing [pdf]Paper   bibtex
Finding Buffer Overflow Inducing Loops in Binary Executables. Rawat, S.; and Mounier, L. In SERE, September 2012.
Finding Buffer Overflow Inducing Loops in Binary Executables [pdf]Paper   bibtex
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions. Giuffrida, C.; Ortolani, S.; and Crispo, B. In ASIACCS, September 2012.
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions [pdf]Paper   bibtex
Safe and Automated State Transfer for Secure and Reliable Live Update. Giuffrida, C.; and Tanenbaum, A. In HotSwUp, September 2012.
Safe and Automated State Transfer for Secure and Reliable Live Update [pdf]Paper   bibtex
System-level Support for Intrusion Recovery. Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H. In DIMVA, September 2012.
System-level Support for Intrusion Recovery [pdf]Paper   bibtex
  2011 (8)
Application-Tailored I/O with Streamline. de Bruijn, W.; Bos, H.; and Bal, H. TOCS, 29(2): 6:1--6:33. December 2011.
Application-Tailored I/O with Streamline [pdf]Paper   bibtex
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Slowinska, A.; Stancescu, T.; and Bos, H. In NDSS, November 2011.
Howard: A Dynamic Excavator for Reverse Engineering Data Structures [pdf]Paper   bibtex
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2011.
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware [pdf]Paper   bibtex
Minemu: The World's Fastest Taint Tracker. Bosman, E.; Slowinska, A.; and Bos, H. In RAID, October 2011.
Minemu: The World's Fastest Taint Tracker [pdf]Paper   bibtex
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. Rawat, S.; and Mounier, L. In ICSTW, September 2011.
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results [pdf]Paper   bibtex
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments. D'Angelo, C. A.; Giuffrida, C.; and Abramo, G. JASIST, 62(2). September 2011.
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments [link]Paper   bibtex
On Botnets that Use DNS for Command and Control. Dietrich, C. J.; Rossow, C.; Freiling, F. C.; Bos, H.; Steen, M. v.; and Pohlmann, N. In EC2ND, September 2011.
On Botnets that Use DNS for Command and Control [pdf]Paper   bibtex
System Security at VU University Amsterdam. Bos, H.; Cavallaro, L.; and Tanenbaum, A. S. In SysSec Workshop, August 2011.
System Security at VU University Amsterdam [pdf]Paper   bibtex
  2010 (9)
Bait Your Hook: A Novel Detection Technique for Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2010.
Bait Your Hook: A Novel Detection Technique for Keyloggers [pdf]Paper   bibtex
Paranoid Android: Versatile Protection For Smartphones. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; and Bos, H. In ACSAC, October 2010.
Paranoid Android: Versatile Protection For Smartphones [pdf]Paper   bibtex
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light. Rawat, S.; and Mounier, L. In EC2ND, September 2010.
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light [pdf]Paper   bibtex
We Crashed, Now What?. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S In HotDep, September 2010.
We Crashed, Now What? [pdf]Paper   bibtex
Pointer Tainting Still Pointless: (But We All See the Point of Tainting). Slowinska, A.; and Bos, H. OSR, 44(3): 88--92. September 2010.
Pointer Tainting Still Pointless: (But We All See the Point of Tainting) [pdf]Paper   bibtex
DDE: Dynamic Data Structure Excavation. Slowinska, A.; Stancescu, T.; and Bos, H. In APSYS, September 2010.
DDE: Dynamic Data Structure Excavation [pdf]Paper   bibtex
A Gossip-based Churn Estimator for Large Dynamic Networks. Giuffrida, C.; and Ortolani, S. In ASCI, August 2010.
A Gossip-based Churn Estimator for Large Dynamic Networks [pdf]Paper   bibtex
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). August 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   bibtex
A Taxonomy of Live Updates. Giuffrida, C.; and Tanenbaum, A. S. In ASCI, August 2010.
A Taxonomy of Live Updates [pdf]Paper   bibtex
  2009 (8)
Pointless Tainting? Evaluating the Practicality of Pointer Tainting. Slowinska, A.; and Bos, H. In EuroSys, December 2009.
Pointless Tainting? Evaluating the Practicality of Pointer Tainting [pdf]Paper   bibtex
Fault Isolation for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2009.
Fault Isolation for Device Drivers [pdf]Paper   bibtex
Application Security Code Analysis: A Step Towards Software Assurance. Rawat, S.; and Saxena, A. IJICS, 3(1): 86--110. September 2009.
Application Security Code Analysis: A Step Towards Software Assurance [link]Paper   bibtex
Danger Theory Based SYN Flood Attack Detection in Autonomic Network. Rawat, S.; and Saxena, A. In SIN, September 2009.
Danger Theory Based SYN Flood Attack Detection in Autonomic Network [link]Paper   bibtex
Cooperative Update: A New Model for Dependable Live Update. Giuffrida, C.; and Tanenbaum, A. S. In HotSwUp, September 2009.
Cooperative Update: A New Model for Dependable Live Update [pdf]Paper   bibtex
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC. Bos, H.; and Huang, K. In ANCS, September 2009.
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC [pdf]Paper   bibtex
Mapping and Synchronizing Streaming Applications on Cell Processors. Nijhuis, M.; Bos, H.; Bal, H.; and Augonnet, C. In HiPEAC, September 2009.
Mapping and Synchronizing Streaming Applications on Cell Processors [pdf]Paper   bibtex
Prepare to Die: A New Paradigm for Live Update. Giuffrida, C.; and Tanenbaum, A. Technical Report VU Amsterdam, August 2009.
Prepare to Die: A New Paradigm for Live Update [pdf]Paper   bibtex
  2008 (7)
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Portokalidis, G.; and Bos, H. In EuroSys, December 2008.
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits [pdf]Paper   bibtex
Beltway Buffers: Avoiding the OS Traffic Jam. Bruijn, W. d.; and Bos, H. In INFOCOM, November 2008.
Beltway Buffers: Avoiding the OS Traffic Jam [pdf]Paper   bibtex
PipesFS: Fast Linux I/O in the Unix Tradition. Bruijn, W. d.; and Bos, H. OSR, . September 2008.
PipesFS: Fast Linux I/O in the Unix Tradition [pdf]Paper   bibtex
Safe Execution of Untrusted Applications on Embedded Network Processors. Bos, H.; Samwel, B.; Cristea, M.; and Anagnostakis, K. IJES, 4(3). September 2008.
Safe Execution of Untrusted Applications on Embedded Network Processors [pdf]Paper   bibtex
Model-T: Rethinking the OS for Terabit Speeds. Bruijn, W. d.; and Bos, H. In HSN, September 2008.
Model-T: Rethinking the OS for Terabit Speeds [pdf]Paper   bibtex
Future Threats to Future Trust. Bos, H.; Ioannidis, S.; Jonsson, E.; Kirda, E.; and Kruegel, C. In FTC, September 2008.
Future Threats to Future Trust [pdf]Paper   bibtex
Countering IPC Threats in Multiserver Operating Systems. Herder, J.; Bos, H.; Homburg, P.; Gras, B.; and Tanenbaum, A. S. In PRDC, September 2008.
Countering IPC Threats in Multiserver Operating Systems [pdf]Paper   bibtex
  2007 (10)
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Slowinska, A.; and Bos, H. In ACSAC, October 2007.
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack [pdf]Paper   bibtex
Failure Resilience for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2007.
Failure Resilience for Device Drivers [pdf]Paper   bibtex
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms. Sastry, C. S.; Rawat, S.; Pujari, A. K.; and Gulati, V. P. Information Sciences, 177(23). September 2007.
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms [link]Paper   bibtex
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting. Valkering, M.; Slowinska, A.; and Bos, H. In EC2ND, September 2007.
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [pdf]Paper   bibtex
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Cristea, M.; Gommans, L.; Xu, L.; and Bos, H. In Networking, September 2007.
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [pdf]Paper   bibtex
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications. Nijhuis, M.; Bos, H.; and Bal, H. In ICPP, September 2007.
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications [pdf]Paper   bibtex
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots. Portokalidis, G.; and Bos, H. Computer Networks, 51(5). September 2007.
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots [pdf]Paper   bibtex
Ruler: Easy Packet Matching and Rewriting on Network Processors. Hruby, T.; Reeuwijk, K. v.; and Bos, H. In ANCS, September 2007.
Ruler: Easy Packet Matching and Rewriting on Network Processors [pdf]Paper   bibtex
Roadmap to a Failure-Resilient Operating System. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 32(1). August 2007. 00010
Roadmap to a Failure-Resilient Operating System [pdf]Paper   bibtex
Use of Dimensionality Reduction for Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In Information Systems Security. August 2007.
Use of Dimensionality Reduction for Intrusion Detection [link]Paper   bibtex   buy
  2006 (15)
Argos: an Emulator for Fingerprinting Zero-Day Attacks. Portokalidis, G.; Slowinska, A.; and Bos, H. In EuroSys, December 2006.
Argos: an Emulator for Fingerprinting Zero-Day Attacks [pdf]Paper   bibtex
SafeCard: A Gigabit IPS on the Network Card. Bruijn, W. d.; Slowinska, A.; Reeuwijk, K. v.; Hruby, T.; Xu, L.; and Bos, H. In RAID, October 2006.
SafeCard: A Gigabit IPS on the Network Card [pdf]Paper   bibtex
Supporting Reconfigurable Parallel Multimedia Applications. Nijhuis, M.; Bos, H.; and Bal, H. E. In EuroPar, October 2006.
Supporting Reconfigurable Parallel Multimedia Applications [pdf]Paper   bibtex
Can We Make Operating Systems Reliable and Secure?. Andrew S. Tanenbaum, J. N. H.; and Bos, H. IEEE Computer, 39(4). October 2006.
Can We Make Operating Systems Reliable and Secure? [pdf]Paper   bibtex
LLE on System Calls for Host Based Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In CIS, September 2006.
LLE on System Calls for Host Based Intrusion Detection [link]Paper   bibtex
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. Rawat, S.; Pujari, A. K.; and Gulati, V. P. VODCA, 142. September 2006.
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System [pdf]Paper   bibtex
Masquerade Detection Using IA Network. Dash, S. K.; Rawat, S.; Kumari, G. V.; and Pujari, A. K. In CPSec, September 2006.
Masquerade Detection Using IA Network [pdf]Paper   bibtex
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric. Rawat, S.; Gulati, V. P.; Pujari, A. K.; and Vemuri, V. R. JIAS, 1(1). September 2006.
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric [pdf]Paper   bibtex
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing. Bos, H.; Samwel, B.; and Booij, I. Computer Networks, 50(14). September 2006.
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing [pdf]Paper   bibtex
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications. Varbanescu, A. L.; Nijhuis, M.; Gonzalez, A.; Escribano; Sips, H.; Bos, H.; and Ba, H. In LCPC, September 2006.
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications [pdf]Paper   bibtex
File Size Distribution on UNIX Systems - Then and Now. Tanenbaum, A. S.; Herder, J.; and Bos, H. OSR, 40(1). September 2006.
File Size Distribution on UNIX Systems - Then and Now [pdf]Paper   bibtex
Reorganizing UNIX for Reliability. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In ACSAC, September 2006.
Reorganizing UNIX for Reliability [pdf]Paper   bibtex
Construction of a Highly Dependable Operating System. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In EDCC, September 2006.
Construction of a Highly Dependable Operating System [pdf]Paper   bibtex
Minix 3: A Highly Reliable, Self-Repairing Operating System. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. OSR, 40(3). September 2006.
Minix 3: A Highly Reliable, Self-Repairing Operating System [pdf]Paper   bibtex
Modular System Programming in Minix 3. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 31(2). August 2006.
Modular System Programming in Minix 3 [pdf]Paper   bibtex
  2005 (7)
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Bos, H.; and Huang, K. In RAID, October 2005.
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card [pdf]Paper   bibtex
FPL-3: Towards Language Support for Distributed Packet Processing. Cristea, M.; Bruijn, W. d.; and Bos, H. In Networking, September 2005.
FPL-3: Towards Language Support for Distributed Packet Processing [pdf]Paper   bibtex
Robust Distributed Systems - Achieving Self-Management Through Inference. Bruijn, W. d.; Bos, H.; and Bal, H. In ACC, September 2005.
Robust Distributed Systems - Achieving Self-Management Through Inference [pdf]Paper   bibtex
FPL-3E: Towards Language Support for Reconfigurable Packet Processing. Cristea, M. L.; Zissulescu, C.; Deprettere, E.; and Bos, H. In SAMOS, September 2005.
FPL-3E: Towards Language Support for Reconfigurable Packet Processing [link]Paper   bibtex
Application of Wavelets in Network Security. Sastry, C. S.; and Rawat, S. In Enhancing Computer Security with Smart Technology, Auerbach Publications, Boca Raton. August 2005.
Application of Wavelets in Network Security [link]Paper   bibtex   buy
Efficient Data Mining Algorithms for Intrusion Detection. Rawat, S. Ph.D. Thesis, University of Hyderabad, August 2005.
Efficient Data Mining Algorithms for Intrusion Detection [link]Paper   bibtex
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Rawat, S.; Gulati, V. P.; and Pujari, A. K. In Transactions on Rough Sets IV. August 2005.
A Fast Host-Based Intrusion Detection System Using Rough Set Theory [link]Paper   bibtex   buy
  2004 (6)
FFPF: Fairly Fast Packet Filters. Bos, H.; Bruijn, W. d.; Cristea, M.; Nguyen, T.; and Portokalidis, G. In OSDI, December 2004.
FFPF: Fairly Fast Packet Filters [pdf]Paper   bibtex
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection. Rawat, S.; Gulati, V. P.; and Pujari, A. K. IMCS, 12(5). September 2004.
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection [pdf]Paper   bibtex
Network Intrusion Detection Using Wavelet Analysis. Rawat, S.; and Sastry, C. S. In IIT, September 2004.
Network Intrusion Detection Using Wavelet Analysis [link]Paper   bibtex
On the Feasability of Using Network Processors for DNA Queries. Bos, H.; and Huang, K. In NP, September 2004.
On the Feasability of Using Network Processors for DNA Queries [pdf]Paper   bibtex
SNMP Plus a Lightweight API for SNAP Handling (SPLASH). Bruijn, W. d.; Bos, H.; and Moore, J. In NOMS, September 2004.
SNMP Plus a Lightweight API for SNAP Handling (SPLASH) [pdf]Paper   bibtex
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach. Nguyen, T.; Bruijn, W. d.; Cristea, M.; and Bos, H. In IPOM, September 2004.
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach [pdf]Paper   bibtex
  2003 (2)
HOKES/POKES: Lightweight Resource Sharing. Bos, H.; and Samwel, B. In EmSoft, September 2003.
HOKES/POKES: Lightweight Resource Sharing [pdf]Paper   bibtex
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Coppens, J.; Berghe, S. V. d.; Bos, H.; Markatos, E.; Turck, F. D.; Oslebo, A.; and Ubik, S. In E2EMON, September 2003.
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks [pdf]Paper   bibtex

 
Generated by BibBase.

 
vusec-logo_large

Share on Facebook0Tweet about this on TwitterShare on Google+0Email this to someonePrint this page