Publications

  2017 (10)
Towards Automated Discovery of Crash-Resistant Primitives in Binaries. Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T. In DSN, June 2017.
bibtex
No Need to Hide: Protecting Safe Regions on Commodity Hardware. Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E. In EuroSys, April 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware [pdf]Paper   bibtex
DangSan: Scalable Use-after-free Detection. van der Kouwe, E.; Nigade, V.; and Giuffrida, C. In EuroSys, April 2017.
DangSan: Scalable Use-after-free Detection [pdf]Paper   bibtex
Compiler-Agnostic Function Detection in Binaries. Andriesse, D.; Slowinska, A.; and Bos, H. In EuroS&P, April 2017.
Compiler-Agnostic Function Detection in Binaries [pdf]Paper   bibtex
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Chen, X.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2017.
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks [pdf]Paper   bibtex
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. Technical Report IR-CS-51, VU Amsterdam, February 2017.
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU [pdf]Paper   bibtex
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   bibtex
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Milburn, A.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [pdf]Paper   bibtex
MARX: Uncovering Class Hierarchies in C++ Programs. Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C. In NDSS, February 2017.
MARX: Uncovering Class Hierarchies in C++ Programs [pdf]Paper   bibtex
VUzzer: Application-aware Evolutionary Fuzzing. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H. In NDSS, February 2017.
VUzzer: Application-aware Evolutionary Fuzzing [pdf]Paper   bibtex
  2016 (27)
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H. In USENIX Security, December 2016.
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries [pdf]Paper   bibtex
Undermining Information Hiding (And What to do About it). Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In USENIX Security, December 2016.
Undermining Information Hiding (And What to do About it) [pdf]Paper   bibtex
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In USENIX Security, December 2016.
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   bibtex
Poking Holes in Information Hiding. Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C. In USENIX Security, December 2016.
Poking Holes in Information Hiding [pdf]Paper   bibtex
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, December 2016.
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   bibtex
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C. In S&P, December 2016.
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [pdf]Paper   bibtex
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C. In CCS, November 2016.
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   bibtex
TypeSan: Practical Type Confusion Detection. Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In CCS, November 2016.
TypeSan: Practical Type Confusion Detection [pdf]Paper   bibtex
A NEaT Design for Reliable and Scalable Network Stacks. Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S. In CoNext, November 2016.
A NEaT Design for Reliable and Scalable Network Stacks [pdf]Paper   bibtex
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In DSN, October 2016.
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [pdf]Paper   bibtex
VTPin: Practical VTable Hijacking Protection for Binaries. Sarbinowski, P.; Kemerlis, V. P.; Giuffrida, C.; and Athanasopoulos, E. In ACSAC, October 2016.
VTPin: Practical VTable Hijacking Protection for Binaries [pdf]Paper   bibtex
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. Koning, K.; Bos, H.; and Giuffrida, C. In DSN, October 2016.
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [pdf]Paper   bibtex
HSFI: Representative Fault Injection Scalable to Large Code Bases. Kouwe, E. v. d.; and Tanenbaum, A. S. In DSN, October 2016.
HSFI: Representative Fault Injection Scalable to Large Code Bases [pdf]Paper   bibtex
Binary Rejuvenation: Applications and Challenges. Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H. IEEE S&P Magazine, 14(1). September 2016.
Binary Rejuvenation: Applications and Challenges [pdf]Paper   bibtex
DroydSeuss: A Mobile Banking Trojan Tracker. Coletta, A.; van der Veen, V.; and Maggi, F. In FC, September 2016.
DroydSeuss: A Mobile Banking Trojan Tracker [pdf]Paper   bibtex
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming. Veggalam, S.; Rawat, S.; Haller, I.; and Bos, H. In ESORICS, September 2016.
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming [pdf]Paper   doi   bibtex
Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. TSE, . September 2016.
Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening. Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In EuroSec, September 2016.
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening [pdf]Paper   bibtex
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging. Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C. In ISSRE, September 2016.
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [pdf]Paper   bibtex
Toward Large-Scale Vulnerability Discovery Using Machine Learning. Grieco, G.; Grinblat, G. L.; Uzal, L.; Rawat, S.; Feist, J.; and Mounier, L. In CODASPY, September 2016.
Toward Large-Scale Vulnerability Discovery Using Machine Learning [pdf]Paper   bibtex
Slick: An Intrusion Detection System for Virtualized Storage Devices. Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H. In SAC, September 2016.
Slick: An Intrusion Detection System for Virtualized Storage Devices [pdf]Paper   bibtex
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Konoth, R. K.; van der Veen, V.; and Bos, H. In FC, September 2016.
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [pdf]Paper   bibtex
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. Stanciu, V.; Spolaor, R.; Conti, M.; and Giuffrida, C. In CODASPY, September 2016.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks [pdf]Paper   bibtex
Trade-offs in Automatic Provenance Capture. Stamatogiannakis, M.; Kazmi, H.; Sharif, H.; Vermeulen, R.; Gehani, A.; Bos, H.; and Groth, P. In IPAW, September 2016.
Trade-offs in Automatic Provenance Capture [link]Paper   bibtex
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In Black Hat Europe, August 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Paper   bibtex
Bypassing Clang's SafeStack for Fun and Profit. Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In Black Hat Europe, August 2016.
Bypassing Clang's SafeStack for Fun and Profit [pdf]Paper   bibtex
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, August 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Paper   bibtex
  2015 (19)
Practical Context-Sensitive CFI. van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C. In CCS, November 2015.
Practical Context-Sensitive CFI [pdf]Paper   bibtex
R2C2: A Network Stack for Rack-scale Computers. Costa, P.; Ballani, H.; Razavi, K.; and Kash, I. In SIGCOMM, November 2015.
R2C2: A Network Stack for Rack-scale Computers [pdf]Paper   bibtex
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C. In NDSS, November 2015.
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries [pdf]Paper   bibtex
ShrinkWrap: VTable Protection Without Loose Ends. Haller, I.; Goktas, E.; Athanasopoulos, E.; Portokalidis, G.; and Bos, H. In ACSAC, October 2015.
ShrinkWrap: VTable Protection Without Loose Ends [pdf]Paper   bibtex
Speculative Memory Checkpointing. Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In Middleware, October 2015.
Speculative Memory Checkpointing [pdf]Paper   bibtex
CAIN: Silently Breaking ASLR in the Cloud. Barresi, A.; Razavi, K.; Payer, M.; and Gross, T. R. In WOOT, October 2015.
CAIN: Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
Decoupling Provenance Capture and Analysis from Execution. Stamatogiannakis, M.; Groth, P.; and Bos, H. In TaPP, October 2015.
Decoupling Provenance Capture and Analysis from Execution [link]Paper   bibtex
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds. Razavi, K.; Kolk, G. V. D.; and Kielmann, T. In ICDCS, October 2015.
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds [pdf]Paper   bibtex
Reliable Recon in Adversarial Peer-to-Peer Botnets. Andriesse, D.; Rossow, C.; and Bos, H. In IMC, October 2015.
Reliable Recon in Adversarial Peer-to-Peer Botnets [pdf]Paper   bibtex
PIE: Parser Identification in Embedded Systems. Cojocar, L.; Zaddach, J.; Verdult, R.; Bos, H.; Balzarotti, D.; and Francillon, A. In ACSAC, October 2015.
PIE: Parser Identification in Embedded Systems [pdf]Paper   bibtex
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. Andriesse, D.; Bos, H.; and Slowinska, A. In DSN, October 2015.
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming [pdf]Paper   bibtex
Lightweight Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2015.
Lightweight Memory Checkpointing [pdf]Paper   bibtex
Scaling VM Deployment in an Open Source Cloud Stack. Razavi, K.; Costache, S.; Gardiman, A.; Verstoep, K.; and Kielmann, T. In ScienceCloud, September 2015.
Scaling VM Deployment in an Open Source Cloud Stack [pdf]Paper   bibtex
A Methodology to Efficiently Compare Operating System Stability. van der Kouwe, E.; Giuffrida, C.; Ghituletez, R.; and Tanenbaum, A. In HASE, September 2015.
A Methodology to Efficiently Compare Operating System Stability [pdf]Paper   bibtex
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Grill, B.; Bacs, A.; Platzer, C.; and Bos, H. In DIMVA, September 2015.
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them [pdf]Paper   bibtex
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure. Razavi, K.; Ion, A.; Tato, G.; Jeong, K.; Figueiredo, R.; Pierre, G.; and Kielmann, T. In IC2E, September 2015.
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure [pdf]Paper   bibtex
The BORG: Nanoprobing Binaries for Buffer Overreads. Neugschwandtner, M.; Milani Comparetti, P.; Haller, I.; and Bos, H. In CODASPY, September 2015.
The BORG: Nanoprobing Binaries for Buffer Overreads [pdf]Paper   bibtex
Silently Breaking ASLR in the Cloud. Barresi, A.; and Razavi, K. In Black Hat Europe, August 2015.
Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
Fast and Scalable Virtual Machine Deployment. Razavi, K. Ph.D. Thesis, VU Amsterdam, August 2015.
bibtex
  2014 (21)
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. Goktas, E.; Athanasopoulos, E.; Polychronakis, M.; Bos, H.; and Portokalidis, G. In USENIX Security, December 2014.
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard [pdf]Paper   bibtex
Out Of Control: Overcoming Control-Flow Integrity. Goktas, E.; Athanasopoulos, E.; Bos, H.; and Portokalidis, G. In S&P, December 2014.
Out Of Control: Overcoming Control-Flow Integrity [pdf]Paper   bibtex
Framing signals - Return to portable exploits. Bosman, E.; and Bos, H. In S&P, December 2014.
Framing signals - Return to portable exploits [pdf]Paper   bibtex
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes. Razavi, K.; Ion, A.; and Kielmann, T. In HPDC, of HPDC '14, October 2014.
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes [pdf]Paper   bibtex
On Sockets and System Calls: Minimizing Context Switches for the Socket API. Hruby, T.; Crivat, T.; Bos, H.; and Tanenbaum, A. S. In TRIOS, October 2014.
On Sockets and System Calls: Minimizing Context Switches for the Socket API [pdf]Paper   bibtex
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. In Middleware, October 2014.
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. SQL, 24(1). September 2014.
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments [link]Paper   bibtex
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In CODASPY, September 2014.
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection [pdf]Paper   bibtex
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. Rawat, S.; Mounier, L.; and Potet, M. In ARES, September 2014.
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis [pdf]Paper   bibtex
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Giuffrida, C.; Majdanik, K.; Conti, M.; and Bos, H. In DIMVA, September 2014.
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [pdf]Paper   bibtex
Evaluating Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. In HASE, September 2014.
Evaluating Distortion in Fault Injection Experiments [pdf]Paper   bibtex
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables). Slowinska, A.; Haller, I.; Bacs, A.; Baranga, S.; and Bos, H. In DIMVA, September 2014.
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables) [pdf]Paper   bibtex
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation. Stamatogiannakis, M.; Groth, P.; and Bos, H. In IPAW, September 2014.
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation [pdf]Paper   bibtex
Towards Optimal Scheduling of Multiserver System Components. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In MOS, September 2014.
Towards Optimal Scheduling of Multiserver System Components [pdf]Paper   bibtex
On measuring the impact of DDoS botnets. Welzel, A.; Rossow, C.; and Bos, H. In EuroSec, September 2014.
On measuring the impact of DDoS botnets [pdf]Paper   bibtex
Enter Sandbox: Android Sandbox Comparison. Neuner, S.; van der Veen, V.; Lindorfer, M.; Huber, M.; Merzdovnik, G.; Mulazzani, M.; and Weippl, E. In MoST, September 2014.
Enter Sandbox: Android Sandbox Comparison [pdf]Paper   bibtex
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. Lindorfer, M.; Neugschwandtner, M.; Weichselbaum, L.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. In BADGERS, September 2014.
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors [pdf]Paper   bibtex
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. In EDCC, September 2014.
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments [pdf]Paper   bibtex
Instruction-Level Steganography for Covert Trigger-Based Malware. Andriesse, D.; and Bos, H. In DIMVA, September 2014.
Instruction-Level Steganography for Covert Trigger-Based Malware [pdf]Paper   bibtex
Safe and Automatic Live Update. Giuffrida, C. Ph.D. Thesis, VU Amsterdam, August 2014.
Safe and Automatic Live Update [pdf]Paper   bibtex
Andrubis: Android Malware under the Magnifying Glass. Weichselbaum, L.; Neugschwandtner, M.; Lindorfer, M.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. Technical Report August 2014.
Andrubis: Android Malware under the Magnifying Glass [pdf]Paper   bibtex
  2013 (22)
Safe and Automatic Live Update for Operating Systems. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In ASPLOS, December 2013.
Safe and Automatic Live Update for Operating Systems [pdf]Paper   bibtex
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H. In USENIX Security, December 2013.
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations [pdf]Paper   bibtex
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Rossow, C.; Andriesse, D.; Werner, T.; Stone-Gross, B.; Dietrich, C. J.; and Bos, H. In S&P, December 2013.
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets [pdf]Paper   bibtex
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In USENIX ATC, November 2013.
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems [pdf]Paper   bibtex
Scalable Virtual Machine Deployment Using VM Image Caches. Razavi, K.; and Kielmann, T. In SC, October 2013.
Scalable Virtual Machine Deployment Using VM Image Caches [pdf]Paper   bibtex
Practical Automated Vulnerability Monitoring Using Program State Invariants. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S. In DSN, October 2013.
Practical Automated Vulnerability Monitoring Using Program State Invariants [pdf]Paper   bibtex
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. Giuffrida, C.; Iorgulescu, C.; Kuijsten, A.; and Tanenbaum, A. S. In LISA, October 2013.
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer [pdf]Paper   bibtex
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Razavi, K.; Razorea, L. M.; and Kielmann, T. In DIHC, September 2013.
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation [pdf]Paper   bibtex
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In WCRE, September 2013.
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection [pdf]Paper   bibtex
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming. Rawat, S.; Duchene, F.; Groz, R.; and Richier, J. In CICS, September 2013.
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming [link]Paper   bibtex
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Grieco, G.; Mounier, L.; Potet, M.; and Rawat, S. In ICSTW, September 2013.
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis [pdf]Paper   bibtex
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In PRDC, September 2013.
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments [pdf]Paper   bibtex
Unprivileged Black-Box Detection of User-Space Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. TDSC, 10(1). September 2013.
Unprivileged Black-Box Detection of User-Space Keyloggers [pdf]Paper   bibtex
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries. Chen, X.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries [pdf]Paper   bibtex
MemPick: Data Structure Detection in C/C++ Binaries. Haller, I.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
MemPick: Data Structure Detection in C/C++ Binaries [pdf]Paper   bibtex
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. Andriesse, D.; Rossow, C.; Stone-Gross, B.; Plohmann, D.; and Bos, H. In MALWARE, September 2013.
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus [pdf]Paper   bibtex
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   bibtex
Combining Static and Dynamic Analysis for Vulnerability Detection. Rawat, S.; Ceara, D.; Mounier, L.; and Potet, M. Technical Report August 2013.
Combining Static and Dynamic Analysis for Vulnerability Detection [link]Paper   bibtex
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz. Duchene, F.; Rawat, S.; Richier, J.; Groz, R.; and others In SSTIC, August 2013.
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz [link]Paper   bibtex
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In NSC, August 2013.
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering [link]Paper   bibtex
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications. Pierre, G.; Kielmann, T.; Rocca, E.; Razavi, K; IJff, B.; Fernandez, H.; Figueiredo, R.; Uta, A.; Vintila, A.; Oprescu, A.; Schuett, T.; Berlin, M.; Artac, M.; and Cernivec, A. In HPDC (poster), August 2013.
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications [pdf]Paper   bibtex
Dynamic Analysis of Android Malware. van der Veen, V.; Bos, H.; and Rossow, C. Ph.D. Thesis, August 2013.
Dynamic Analysis of Android Malware [pdf]Paper   bibtex
  2012 (10)
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In USENIX Security, December 2012.
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [pdf]Paper   bibtex
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Rossow, C.; Dietrich, C. J.; Grier, C.; Kreibich†, C.; Paxson†, V.; Pohlmann, N.; Bos, H.; and Steen, M. v. In S&P, December 2012.
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook [pdf]Paper   bibtex
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Slowinska, A.; Stancescu, T.; and Bos, H. In USENIX ATC, November 2012.
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation [pdf]Paper   bibtex
Memory Errors: The Past, the Present, and the Future. van der Veen, V.; Dutt-Sharma, N.; Cavallaro, L.; and Bos, H. In RAID, October 2012.
Memory Errors: The Past, the Present, and the Future [pdf]Paper   bibtex
Keep Net Working - On a Dependable and Fast Networking Stack. Hruby, T.; Vogt, D.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2012.
Keep Net Working - On a Dependable and Fast Networking Stack [pdf]Paper   bibtex
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. Duchene, F.; Groz, R.; Rawat, S.; and Richier, J. In ICST, September 2012.
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing [pdf]Paper   bibtex
Finding Buffer Overflow Inducing Loops in Binary Executables. Rawat, S.; and Mounier, L. In SERE, September 2012.
Finding Buffer Overflow Inducing Loops in Binary Executables [pdf]Paper   bibtex
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions. Giuffrida, C.; Ortolani, S.; and Crispo, B. In ASIACCS, September 2012.
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions [pdf]Paper   bibtex
Safe and Automated State Transfer for Secure and Reliable Live Update. Giuffrida, C.; and Tanenbaum, A. In HotSwUp, September 2012.
Safe and Automated State Transfer for Secure and Reliable Live Update [pdf]Paper   bibtex
System-level Support for Intrusion Recovery. Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H. In DIMVA, September 2012.
System-level Support for Intrusion Recovery [pdf]Paper   bibtex
  2011 (8)
Application-Tailored I/O with Streamline. de Bruijn, W.; Bos, H.; and Bal, H. TOCS, 29(2): 6:1--6:33. December 2011.
Application-Tailored I/O with Streamline [pdf]Paper   bibtex
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Slowinska, A.; Stancescu, T.; and Bos, H. In NDSS, November 2011.
Howard: A Dynamic Excavator for Reverse Engineering Data Structures [pdf]Paper   bibtex
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2011.
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware [pdf]Paper   bibtex
Minemu: The World's Fastest Taint Tracker. Bosman, E.; Slowinska, A.; and Bos, H. In RAID, October 2011.
Minemu: The World's Fastest Taint Tracker [pdf]Paper   bibtex
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. Rawat, S.; and Mounier, L. In ICSTW, September 2011.
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results [pdf]Paper   bibtex
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments. D'Angelo, C. A.; Giuffrida, C.; and Abramo, G. JASIST, 62(2). September 2011.
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments [link]Paper   bibtex
On Botnets that Use DNS for Command and Control. Dietrich, C. J.; Rossow, C.; Freiling, F. C.; Bos, H.; Steen, M. v.; and Pohlmann, N. In EC2ND, September 2011.
On Botnets that Use DNS for Command and Control [pdf]Paper   bibtex
System Security at VU University Amsterdam. Bos, H.; Cavallaro, L.; and Tanenbaum, A. S. In SysSec Workshop, August 2011.
System Security at VU University Amsterdam [pdf]Paper   bibtex
  2010 (9)
Bait Your Hook: A Novel Detection Technique for Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2010.
Bait Your Hook: A Novel Detection Technique for Keyloggers [pdf]Paper   bibtex
Paranoid Android: Versatile Protection For Smartphones. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; and Bos, H. In ACSAC, October 2010.
Paranoid Android: Versatile Protection For Smartphones [pdf]Paper   bibtex
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light. Rawat, S.; and Mounier, L. In EC2ND, September 2010.
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light [pdf]Paper   bibtex
We Crashed, Now What?. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S In HotDep, September 2010.
We Crashed, Now What? [pdf]Paper   bibtex
Pointer Tainting Still Pointless: (But We All See the Point of Tainting). Slowinska, A.; and Bos, H. OSR, 44(3): 88--92. September 2010.
Pointer Tainting Still Pointless: (But We All See the Point of Tainting) [pdf]Paper   bibtex
DDE: Dynamic Data Structure Excavation. Slowinska, A.; Stancescu, T.; and Bos, H. In APSYS, September 2010.
DDE: Dynamic Data Structure Excavation [pdf]Paper   bibtex
A Gossip-based Churn Estimator for Large Dynamic Networks. Giuffrida, C.; and Ortolani, S. In ASCI, August 2010.
A Gossip-based Churn Estimator for Large Dynamic Networks [pdf]Paper   bibtex
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). August 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   bibtex
A Taxonomy of Live Updates. Giuffrida, C.; and Tanenbaum, A. S. In ASCI, August 2010.
A Taxonomy of Live Updates [pdf]Paper   bibtex
  2009 (8)
Pointless Tainting? Evaluating the Practicality of Pointer Tainting. Slowinska, A.; and Bos, H. In EuroSys, December 2009.
Pointless Tainting? Evaluating the Practicality of Pointer Tainting [pdf]Paper   bibtex
Fault Isolation for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2009.
Fault Isolation for Device Drivers [pdf]Paper   bibtex
Application Security Code Analysis: A Step Towards Software Assurance. Rawat, S.; and Saxena, A. IJICS, 3(1): 86--110. September 2009.
Application Security Code Analysis: A Step Towards Software Assurance [link]Paper   bibtex
Danger Theory Based SYN Flood Attack Detection in Autonomic Network. Rawat, S.; and Saxena, A. In SIN, September 2009.
Danger Theory Based SYN Flood Attack Detection in Autonomic Network [link]Paper   bibtex
Cooperative Update: A New Model for Dependable Live Update. Giuffrida, C.; and Tanenbaum, A. S. In HotSwUp, September 2009.
Cooperative Update: A New Model for Dependable Live Update [pdf]Paper   bibtex
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC. Bos, H.; and Huang, K. In ANCS, September 2009.
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC [pdf]Paper   bibtex
Mapping and Synchronizing Streaming Applications on Cell Processors. Nijhuis, M.; Bos, H.; Bal, H.; and Augonnet, C. In HiPEAC, September 2009.
Mapping and Synchronizing Streaming Applications on Cell Processors [pdf]Paper   bibtex
Prepare to Die: A New Paradigm for Live Update. Giuffrida, C.; and Tanenbaum, A. Technical Report VU Amsterdam, August 2009.
Prepare to Die: A New Paradigm for Live Update [pdf]Paper   bibtex
  2008 (7)
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Portokalidis, G.; and Bos, H. In EuroSys, December 2008.
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits [pdf]Paper   bibtex
Beltway Buffers: Avoiding the OS Traffic Jam. Bruijn, W. d.; and Bos, H. In INFOCOM, November 2008.
Beltway Buffers: Avoiding the OS Traffic Jam [pdf]Paper   bibtex
PipesFS: Fast Linux I/O in the Unix Tradition. Bruijn, W. d.; and Bos, H. OSR, . September 2008.
PipesFS: Fast Linux I/O in the Unix Tradition [pdf]Paper   bibtex
Safe Execution of Untrusted Applications on Embedded Network Processors. Bos, H.; Samwel, B.; Cristea, M.; and Anagnostakis, K. IJES, 4(3). September 2008.
Safe Execution of Untrusted Applications on Embedded Network Processors [pdf]Paper   bibtex
Model-T: Rethinking the OS for Terabit Speeds. Bruijn, W. d.; and Bos, H. In HSN, September 2008.
Model-T: Rethinking the OS for Terabit Speeds [pdf]Paper   bibtex
Future Threats to Future Trust. Bos, H.; Ioannidis, S.; Jonsson, E.; Kirda, E.; and Kruegel, C. In FTC, September 2008.
Future Threats to Future Trust [pdf]Paper   bibtex
Countering IPC Threats in Multiserver Operating Systems. Herder, J.; Bos, H.; Homburg, P.; Gras, B.; and Tanenbaum, A. S. In PRDC, September 2008.
Countering IPC Threats in Multiserver Operating Systems [pdf]Paper   bibtex
  2007 (10)
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Slowinska, A.; and Bos, H. In ACSAC, October 2007.
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack [pdf]Paper   bibtex
Failure Resilience for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2007.
Failure Resilience for Device Drivers [pdf]Paper   bibtex
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms. Sastry, C. S.; Rawat, S.; Pujari, A. K.; and Gulati, V. P. Information Sciences, 177(23). September 2007.
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms [link]Paper   bibtex
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting. Valkering, M.; Slowinska, A.; and Bos, H. In EC2ND, September 2007.
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [pdf]Paper   bibtex
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Cristea, M.; Gommans, L.; Xu, L.; and Bos, H. In Networking, September 2007.
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [pdf]Paper   bibtex
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications. Nijhuis, M.; Bos, H.; and Bal, H. In ICPP, September 2007.
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications [pdf]Paper   bibtex
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots. Portokalidis, G.; and Bos, H. Computer Networks, 51(5). September 2007.
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots [pdf]Paper   bibtex
Ruler: Easy Packet Matching and Rewriting on Network Processors. Hruby, T.; Reeuwijk, K. v.; and Bos, H. In ANCS, September 2007.
Ruler: Easy Packet Matching and Rewriting on Network Processors [pdf]Paper   bibtex
Roadmap to a Failure-Resilient Operating System. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 32(1). August 2007. 00010
Roadmap to a Failure-Resilient Operating System [pdf]Paper   bibtex
Use of Dimensionality Reduction for Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In Information Systems Security. August 2007.
Use of Dimensionality Reduction for Intrusion Detection [link]Paper   bibtex   buy
  2006 (15)
Argos: an Emulator for Fingerprinting Zero-Day Attacks. Portokalidis, G.; Slowinska, A.; and Bos, H. In EuroSys, December 2006.
Argos: an Emulator for Fingerprinting Zero-Day Attacks [pdf]Paper   bibtex
SafeCard: A Gigabit IPS on the Network Card. Bruijn, W. d.; Slowinska, A.; Reeuwijk, K. v.; Hruby, T.; Xu, L.; and Bos, H. In RAID, October 2006.
SafeCard: A Gigabit IPS on the Network Card [pdf]Paper   bibtex
Supporting Reconfigurable Parallel Multimedia Applications. Nijhuis, M.; Bos, H.; and Bal, H. E. In EuroPar, October 2006.
Supporting Reconfigurable Parallel Multimedia Applications [pdf]Paper   bibtex
Can We Make Operating Systems Reliable and Secure?. Andrew S. Tanenbaum, J. N. H.; and Bos, H. IEEE Computer, 39(4). October 2006.
Can We Make Operating Systems Reliable and Secure? [pdf]Paper   bibtex
LLE on System Calls for Host Based Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In CIS, September 2006.
LLE on System Calls for Host Based Intrusion Detection [link]Paper   bibtex
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. Rawat, S.; Pujari, A. K.; and Gulati, V. P. VODCA, 142. September 2006.
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System [pdf]Paper   bibtex
Masquerade Detection Using IA Network. Dash, S. K.; Rawat, S.; Kumari, G. V.; and Pujari, A. K. In CPSec, September 2006.
Masquerade Detection Using IA Network [pdf]Paper   bibtex
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric. Rawat, S.; Gulati, V. P.; Pujari, A. K.; and Vemuri, V. R. JIAS, 1(1). September 2006.
Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric [pdf]Paper   bibtex
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing. Bos, H.; Samwel, B.; and Booij, I. Computer Networks, 50(14). September 2006.
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing [pdf]Paper   bibtex
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications. Varbanescu, A. L.; Nijhuis, M.; Gonzalez, A.; Escribano; Sips, H.; Bos, H.; and Ba, H. In LCPC, September 2006.
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications [pdf]Paper   bibtex
File Size Distribution on UNIX Systems - Then and Now. Tanenbaum, A. S.; Herder, J.; and Bos, H. OSR, 40(1). September 2006.
File Size Distribution on UNIX Systems - Then and Now [pdf]Paper   bibtex
Reorganizing UNIX for Reliability. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In ACSAC, September 2006.
Reorganizing UNIX for Reliability [pdf]Paper   bibtex
Construction of a Highly Dependable Operating System. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In EDCC, September 2006.
Construction of a Highly Dependable Operating System [pdf]Paper   bibtex
Minix 3: A Highly Reliable, Self-Repairing Operating System. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. OSR, 40(3). September 2006.
Minix 3: A Highly Reliable, Self-Repairing Operating System [pdf]Paper   bibtex
Modular System Programming in Minix 3. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 31(2). August 2006.
Modular System Programming in Minix 3 [pdf]Paper   bibtex
  2005 (7)
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Bos, H.; and Huang, K. In RAID, October 2005.
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card [pdf]Paper   bibtex
FPL-3: Towards Language Support for Distributed Packet Processing. Cristea, M.; Bruijn, W. d.; and Bos, H. In Networking, September 2005.
FPL-3: Towards Language Support for Distributed Packet Processing [pdf]Paper   bibtex
Robust Distributed Systems - Achieving Self-Management Through Inference. Bruijn, W. d.; Bos, H.; and Bal, H. In ACC, September 2005.
Robust Distributed Systems - Achieving Self-Management Through Inference [pdf]Paper   bibtex
FPL-3E: Towards Language Support for Reconfigurable Packet Processing. Cristea, M. L.; Zissulescu, C.; Deprettere, E.; and Bos, H. In SAMOS, September 2005.
FPL-3E: Towards Language Support for Reconfigurable Packet Processing [link]Paper   bibtex
Application of Wavelets in Network Security. Sastry, C. S.; and Rawat, S. In Enhancing Computer Security with Smart Technology, Auerbach Publications, Boca Raton. August 2005.
Application of Wavelets in Network Security [link]Paper   bibtex   buy
Efficient Data Mining Algorithms for Intrusion Detection. Rawat, S. Ph.D. Thesis, University of Hyderabad, August 2005.
Efficient Data Mining Algorithms for Intrusion Detection [link]Paper   bibtex
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Rawat, S.; Gulati, V. P.; and Pujari, A. K. In Transactions on Rough Sets IV. August 2005.
A Fast Host-Based Intrusion Detection System Using Rough Set Theory [link]Paper   bibtex   buy
  2004 (6)
FFPF: Fairly Fast Packet Filters. Bos, H.; Bruijn, W. d.; Cristea, M.; Nguyen, T.; and Portokalidis, G. In OSDI, December 2004.
FFPF: Fairly Fast Packet Filters [pdf]Paper   bibtex
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection. Rawat, S.; Gulati, V. P.; and Pujari, A. K. IMCS, 12(5). September 2004.
Frequency- and Ordering-Based Similarity Measure for Host-Based Intrusion Detection [pdf]Paper   bibtex
Network Intrusion Detection Using Wavelet Analysis. Rawat, S.; and Sastry, C. S. In IIT, September 2004.
Network Intrusion Detection Using Wavelet Analysis [link]Paper   bibtex
On the Feasability of Using Network Processors for DNA Queries. Bos, H.; and Huang, K. In NP, September 2004.
On the Feasability of Using Network Processors for DNA Queries [pdf]Paper   bibtex
SNMP Plus a Lightweight API for SNAP Handling (SPLASH). Bruijn, W. d.; Bos, H.; and Moore, J. In NOMS, September 2004.
SNMP Plus a Lightweight API for SNAP Handling (SPLASH) [pdf]Paper   bibtex
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach. Nguyen, T.; Bruijn, W. d.; Cristea, M.; and Bos, H. In IPOM, September 2004.
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach [pdf]Paper   bibtex
  2003 (2)
HOKES/POKES: Lightweight Resource Sharing. Bos, H.; and Samwel, B. In EmSoft, September 2003.
HOKES/POKES: Lightweight Resource Sharing [pdf]Paper   bibtex
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Coppens, J.; Berghe, S. V. d.; Bos, H.; Markatos, E.; Turck, F. D.; Oslebo, A.; and Ubik, S. In E2EMON, September 2003.
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks [pdf]Paper   bibtex

 
Generated by BibBase.

 
vusec-logo_large

Share on Facebook0Tweet about this on TwitterShare on Google+0Email this to someonePrint this page