Publications

  2020 (1)
NetCAT: Practical Cache Attacks from the Network. Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Intel Bounty Reward
NetCAT: Practical Cache Attacks from the Network [pdf]Paper   bibtex
  2019 (8)
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. Pawlowski, A.; van der Veen, V.; Andriesse, D.; van der Kouwe, E.; Holz, T.; Giuffrida, C.; and Bos, H. In ACSAC, December 2019.
bibtex
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. Hong, S.; Frigo, P.; Kaya, Y.; Giuffrida, C.; and Dumitras, T. In USENIX Security, August 2019.
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks [pdf]Paper   bibtex
SoK: Benchmarking Flaws in Systems Security. van der Kouwe, E.; Heiser, G.; Andriesse, D.; Bos, H.; and Giuffrida, C. In EuroS&Pa, June 2019.
SoK: Benchmarking Flaws in Systems Security [pdf]Paper   bibtex
RIDL: Rogue In-flight Data Load. van Schaik, S.; Milburn, A.; Österlund, S.; Frigo, P.; Maisuradze, G.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2019. Intel Bounty Reward, Pwnie Award Nomination for Most Innovative Research
RIDL: Rogue In-flight Data Load [pdf]Paper   bibtex
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. Cojocar, L.; Razavi, K.; Giuffrida, C.; and Bos, H. In S&P, May 2019. Best Practical Paper Award, Pwnie Award Nomination for Most Innovative Research
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Paper   bibtex
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution. Österlund, S.; Koning, K.; Olivier, P.; Barbalace, A.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [pdf]Paper   bibtex
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations. Bhat, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [pdf]Paper   bibtex
Are All Citations Worth the Same? Valuing Citations by the Value of the Citing Items. Giuffrida, C.; Abramo, G.; and D'Angelo, C. A. JOI. January 2019.
Are All Citations Worth the Same? Valuing Citations by the Value of the Citing Items [pdf]Paper   bibtex
  2018 (17)
On the Effectiveness of Code Normalization for Function Identification. Oikonomopoulos, A.; Vermeulen, R.; Giuffrida, C.; and Bos, H. In PRDC, December 2018.
On the Effectiveness of Code Normalization for Function Identification [pdf]Paper   bibtex
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. van der Kouwe, E.; Kroes, T.; Ouwehand, C.; Bos, H.; and Giuffrida, C. In ACSAC, December 2018.
Type-After-Type: Practical and Complete Type-Safe Memory Reuse [pdf]Paper   bibtex
TIFF: Using Input Type Inference To Improve Fuzzing. Jain, V.; Rawat, S.; Giuffrida, C.; and Bos, H. In ACSAC, December 2018.
TIFF: Using Input Type Inference To Improve Fuzzing [pdf]Paper   bibtex
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Konoth, R. K.; Vineti, E.; Moonsamy, V.; Lindorfer, M.; Kruegel, C.; Bos, H.; and Vigna, G. In CCS, October 2018.
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense [pdf]Paper   bibtex
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. Konoth, R. K.; Oliverio, M.; Tatar, A.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Razavi, K. In OSDI, October 2018.
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [pdf]Paper   bibtex
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery. Kroes, T.; Altinay, A.; Nash, J.; Na, Y.; Volckaert, S.; Bos, H.; Franz, M.; and Giuffrida, C. In FEAST, October 2018.
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery [pdf]Paper   bibtex
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer. Tatar, A.; Giuffrida, C.; Bos, H.; and Razavi, K. In RAID, September 2018. Best Paper Award
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [pdf]Paper   bibtex
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. Gras, B.; Razavi, K.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2018. Pwnie Award Nomination for Most Innovative Research
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [pdf]Paper   bibtex
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. van Schaik, S.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX Security, August 2018.
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [pdf]Paper   bibtex
Throwhammer: Rowhammer Attacks over the Network and Defenses. Tatar, A.; Konoth, R. K.; Athanasopoulos, E.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX ATC, July 2018. Pwnie Award Nomination for Most Innovative Research
Throwhammer: Rowhammer Attacks over the Network and Defenses [pdf]Paper   bibtex
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. van der Veen, V.; Lindorfer, M.; Fratantonio, Y.; Padmanabha Pillai, H.; Vigna, G.; Kruegel, C.; Bos, H.; and Razavi, K. In DIMVA, June 2018. Pwnie Award Nomination for Best Privilege Escalation Bug
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [pdf]Paper   bibtex
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2018. Pwnie Award Nomination for Most Innovative Research
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [pdf]Paper   bibtex
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Göktaş, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2018.
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [pdf]Paper   bibtex
Delta Pointers: Buffer Overflow Checks Without the Checks. Kroes, T.; Koning, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In EuroSys, April 2018.
Delta Pointers: Buffer Overflow Checks Without the Checks [pdf]Paper   bibtex
Towards Automated Vulnerability Scanning of Network Servers. Schagen, N.; Koen, K.; Bos, H.; and Giuffrida, C. In EuroSec, April 2018.
Towards Automated Vulnerability Scanning of Network Servers [pdf]Paper   bibtex
Benchmarking Crimes: An Emerging Threat in Systems Security. van der Kouwe, E.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Heiser, G. Technical Report arXiv preprint arXiv:1801.02381, January 2018.
Benchmarking Crimes: An Emerging Threat in Systems Security [pdf]Paper   bibtex
Instruction Duplication: Leaky and Not Too Fault-Tolerant!. Cojocar, L.; Papagiannopoulos, K.; and Timmers, N. In Eisenbarth, T.; and Teglia, Y., editor(s), Smart Card Research and Advanced Applications, 2018.
Instruction Duplication: Leaky and Not Too Fault-Tolerant! [pdf]Paper   bibtex
  2017 (21)
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. van der Veen, V.; Andriesse, D.; Stamatogiannakis, M.; Chen, X.; Bos, H.; and Giuffrida, C. In CCS, October 2017.
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [pdf]Paper   bibtex
Secure Page Fusion with VUsion. Oliverio, M.; Razavi, K.; Bos, H.; and Giuffrida, C. In SOSP, October 2017.
Secure Page Fusion with VUsion [pdf]Paper   bibtex
DSIbin: Identifying Dynamic Data Structures in C/C++ Binaries. Ruprecht, T.; Chen, X.; White, D.; Bockmann, J.; Luettgen, G.; and Bos, H. In ASE, October 2017.
bibtex
Understanding Rack-Scale Disaggregated Storage. Legtchenko, S.; Williams, H.; Razavi, K.; Donnelly, A.; Black, R.; Douglas, A.; Cheriere, N.; Fryer, D.; Mast, K.; Brown, A. D.; Klimovic, A.; Slowey, A.; and Rowstron, A. In HotStorage, July 2017.
Understanding Rack-Scale Disaggregated Storage [pdf]Paper   bibtex
Towards Automated Discovery of Crash-Resistant Primitives in Binaries. Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T. In DSN, June 2017.
Towards Automated Discovery of Crash-Resistant Primitives in Binaries [pdf]Paper   bibtex
Analyzing and securing binaries through static disassembly. Andriesse, D. Ph.D. Thesis, VU Amsterdam, June 2017. EuroSys Roger Needham PhD Award, SIGSAC Doctoral Dissertation Award
bibtex
Using run-time randomization against memory corruption attacks on legacy binaries. Chen, X. Ph.D. Thesis, VU Amsterdam, May 2017.
bibtex
Adapting software testing techniques to enhance system security. Haller, I. Ph.D. Thesis, VU Amsterdam, April 2017.
bibtex
Compiler-Agnostic Function Detection in Binaries. Andriesse, D.; Slowinska, A.; and Bos, H. In EuroS&P, April 2017. Best Paper Award
Compiler-Agnostic Function Detection in Binaries [pdf]Paper   bibtex
No Need to Hide: Protecting Safe Regions on Commodity Hardware. Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E. In EuroSys, April 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware [pdf]Paper   bibtex
DangSan: Scalable Use-after-free Detection. van der Kouwe, E.; Nigade, V.; and Giuffrida, C. In EuroSys, April 2017.
DangSan: Scalable Use-after-free Detection [pdf]Paper   bibtex
Off-the-shelf Embedded Devices As Platforms for Security Research. Cojocar, L.; Razavi, K.; and Bos, H. In EuroSec, April 2017.
Off-the-shelf Embedded Devices As Platforms for Security Research [pdf]Paper   bibtex
Fast and Generic Metadata Management with Mid-Fat Pointers. Kroes, T.; Koning, K.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In EuroSec, April 2017.
Fast and Generic Metadata Management with Mid-Fat Pointers [pdf]Paper   bibtex
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. In EuroSec, April 2017.
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [pdf]Paper   bibtex
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Chen, X.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2017.
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks [pdf]Paper   bibtex
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C. In NDSS, February 2017. Pwnie Award for Most Innovative Research, DCSR Paper Award
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   bibtex
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. Technical Report IR-CS-51, VU Amsterdam, February 2017.
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU [pdf]Paper   bibtex
VUzzer: Application-aware Evolutionary Fuzzing. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H. In NDSS, February 2017.
VUzzer: Application-aware Evolutionary Fuzzing [pdf]Paper   bibtex
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Milburn, A.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [pdf]Paper   bibtex
MARX: Uncovering Class Hierarchies in C++ Programs. Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C. In NDSS, February 2017.
MARX: Uncovering Class Hierarchies in C++ Programs [pdf]Paper   bibtex
JTR: A Binary Solution for Switch-Case Recovery. Cojocar, L.; Kroes, T.; and Bos, H. In ESSoS, 2017.
JTR: A Binary Solution for Switch-Case Recovery [link]Paper   bibtex
  2016 (27)
VTPin: Practical VTable Hijacking Protection for Binaries. Sarbinowski, P.; Kemerlis, V. P.; Giuffrida, C.; and Athanasopoulos, E. In ACSAC, December 2016.
VTPin: Practical VTable Hijacking Protection for Binaries [pdf]Paper   bibtex
A NEaT Design for Reliable and Scalable Network Stacks. Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S. In CoNext, December 2016.
A NEaT Design for Reliable and Scalable Network Stacks [pdf]Paper   bibtex
Bypassing Clang's SafeStack for Fun and Profit. Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Bypassing Clang's SafeStack for Fun and Profit [pdf]Paper   bibtex
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Paper   bibtex
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C. In CCS, October 2016. Pwnie Award for Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSR Paper Award
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   bibtex
TypeSan: Practical Type Confusion Detection. Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In CCS, October 2016.
TypeSan: Practical Type Confusion Detection [pdf]Paper   bibtex
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging. Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C. In ISSRE, October 2016.
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [pdf]Paper   bibtex
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming. Veggalam, S.; Rawat, S.; Haller, I.; and Bos, H. In ESORICS, September 2016.
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming [pdf]Paper   doi   bibtex
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016. Pwnie Award Nomination for Best Cryptographic Attack
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   bibtex
Undermining Information Hiding (And What to do About it). Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016.
Undermining Information Hiding (And What to do About it) [pdf]Paper   bibtex
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H. In USENIX Security, August 2016.
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries [pdf]Paper   bibtex
Poking Holes in Information Hiding. Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2016.
Poking Holes in Information Hiding [pdf]Paper   bibtex
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, July 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Paper   bibtex
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. Koning, K.; Bos, H.; and Giuffrida, C. In DSN, June 2016.
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [pdf]Paper   bibtex
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In DSN, June 2016. Best Paper Session
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [pdf]Paper   bibtex
HSFI: Representative Fault Injection Scalable to Large Code Bases. Kouwe, E. v. d.; and Tanenbaum, A. S. In DSN, June 2016.
HSFI: Representative Fault Injection Scalable to Large Code Bases [pdf]Paper   bibtex
Trade-offs in Automatic Provenance Capture. Stamatogiannakis, M.; Kazmi, H.; Sharif, H.; Vermeulen, R.; Gehani, A.; Bos, H.; and Groth, P. In IPAW, June 2016.
Trade-offs in Automatic Provenance Capture [link]Paper   bibtex
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2016. Pwnie Award for Most Innovative Research
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   bibtex
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C. In S&P, May 2016.
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [pdf]Paper   bibtex
Slick: An Intrusion Detection System for Virtualized Storage Devices. Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H. In SAC, April 2016.
Slick: An Intrusion Detection System for Virtualized Storage Devices [pdf]Paper   bibtex
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening. Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2016.
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening [pdf]Paper   bibtex
Toward Large-Scale Vulnerability Discovery Using Machine Learning. Grieco, G.; Grinblat, G. L.; Uzal, L.; Rawat, S.; Feist, J.; and Mounier, L. In CODASPY, March 2016.
Toward Large-Scale Vulnerability Discovery Using Machine Learning [pdf]Paper   bibtex
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. Stanciu, V.; Spolaor, R.; Conti, M.; and Giuffrida, C. In CODASPY, March 2016.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks [pdf]Paper   bibtex
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Konoth, R. K.; van der Veen, V.; and Bos, H. In FC, February 2016.
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [pdf]Paper   bibtex
DroydSeuss: A Mobile Banking Trojan Tracker. Coletta, A.; van der Veen, V.; and Maggi, F. In FC, February 2016.
DroydSeuss: A Mobile Banking Trojan Tracker [pdf]Paper   bibtex
Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; Tamburrelli, G.; and Tanenbaum, A. S. TSE. January 2016.
Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Binary Rejuvenation: Applications and Challenges. Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H. IEEE S&P Magazine, 14(1). January 2016.
Binary Rejuvenation: Applications and Challenges [pdf]Paper   bibtex
  2015 (19)
R2C2: A Network Stack for Rack-scale Computers. Costa, P.; Ballani, H.; Razavi, K.; and Kash, I. In SIGCOMM, November 2015.
R2C2: A Network Stack for Rack-scale Computers [pdf]Paper   bibtex
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C. In NDSS, November 2015.
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries [pdf]Paper   bibtex
Practical Context-Sensitive CFI. van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C. In CCS, November 2015.
Practical Context-Sensitive CFI [pdf]Paper   bibtex
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. Andriesse, D.; Bos, H.; and Slowinska, A. In DSN, October 2015.
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming [pdf]Paper   bibtex
ShrinkWrap: VTable Protection Without Loose Ends. Haller, I.; Goktas, E.; Athanasopoulos, E.; Portokalidis, G.; and Bos, H. In ACSAC, October 2015. Outstanding Student Paper Award
ShrinkWrap: VTable Protection Without Loose Ends [pdf]Paper   bibtex
Lightweight Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2015.
Lightweight Memory Checkpointing [pdf]Paper   bibtex
Speculative Memory Checkpointing. Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In Middleware, October 2015.
Speculative Memory Checkpointing [pdf]Paper   bibtex
CAIN: Silently Breaking ASLR in the Cloud. Barresi, A.; Razavi, K.; Payer, M.; and Gross, T. R. In WOOT, October 2015.
CAIN: Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
Decoupling Provenance Capture and Analysis from Execution. Stamatogiannakis, M.; Groth, P.; and Bos, H. In TaPP, October 2015.
Decoupling Provenance Capture and Analysis from Execution [link]Paper   bibtex
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds. Razavi, K.; Kolk, G. V. D.; and Kielmann, T. In ICDCS, October 2015.
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds [pdf]Paper   bibtex
Reliable Recon in Adversarial Peer-to-Peer Botnets. Andriesse, D.; Rossow, C.; and Bos, H. In IMC, October 2015.
Reliable Recon in Adversarial Peer-to-Peer Botnets [pdf]Paper   bibtex
PIE: Parser Identification in Embedded Systems. Cojocar, L.; Zaddach, J.; Verdult, R.; Bos, H.; Balzarotti, D.; and Francillon, A. In ACSAC, October 2015.
PIE: Parser Identification in Embedded Systems [pdf]Paper   bibtex
A Methodology to Efficiently Compare Operating System Stability. van der Kouwe, E.; Giuffrida, C.; Ghituletez, R.; and Tanenbaum, A. In HASE, September 2015.
A Methodology to Efficiently Compare Operating System Stability [pdf]Paper   bibtex
Scaling VM Deployment in an Open Source Cloud Stack. Razavi, K.; Costache, S.; Gardiman, A.; Verstoep, K.; and Kielmann, T. In ScienceCloud, September 2015.
Scaling VM Deployment in an Open Source Cloud Stack [pdf]Paper   bibtex
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Grill, B.; Bacs, A.; Platzer, C.; and Bos, H. In DIMVA, September 2015.
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them [pdf]Paper   bibtex
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure. Razavi, K.; Ion, A.; Tato, G.; Jeong, K.; Figueiredo, R.; Pierre, G.; and Kielmann, T. In IC2E, September 2015.
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure [pdf]Paper   bibtex
The BORG: Nanoprobing Binaries for Buffer Overreads. Neugschwandtner, M.; Milani Comparetti, P.; Haller, I.; and Bos, H. In CODASPY, September 2015.
The BORG: Nanoprobing Binaries for Buffer Overreads [pdf]Paper   bibtex
Fast and Scalable Virtual Machine Deployment. Razavi, K. Ph.D. Thesis, VU Amsterdam, August 2015.
bibtex
Silently Breaking ASLR in the Cloud. Barresi, A.; and Razavi, K. In Black Hat Europe, August 2015.
Silently Breaking ASLR in the Cloud [pdf]Paper   bibtex
  2014 (21)
Out Of Control: Overcoming Control-Flow Integrity. Goktas, E.; Athanasopoulos, E.; Bos, H.; and Portokalidis, G. In S&P, December 2014. DCSR Paper Award
Out Of Control: Overcoming Control-Flow Integrity [pdf]Paper   bibtex
Framing signals - Return to portable exploits. Bosman, E.; and Bos, H. In S&P, December 2014. Best Student Paper Award
Framing signals - Return to portable exploits [pdf]Paper   bibtex
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. Goktas, E.; Athanasopoulos, E.; Polychronakis, M.; Bos, H.; and Portokalidis, G. In USENIX Security, December 2014.
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard [pdf]Paper   bibtex
On Sockets and System Calls: Minimizing Context Switches for the Socket API. Hruby, T.; Crivat, T.; Bos, H.; and Tanenbaum, A. S. In TRIOS, October 2014.
On Sockets and System Calls: Minimizing Context Switches for the Socket API [pdf]Paper   bibtex
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes. Razavi, K.; Ion, A.; and Kielmann, T. In HPDC, of HPDC '14, October 2014.
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes [pdf]Paper   bibtex
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. In Middleware, October 2014.
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Evaluating Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. In HASE, September 2014. Best Paper Award
Evaluating Distortion in Fault Injection Experiments [pdf]Paper   bibtex
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. SQL, 24(1). September 2014.
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments [link]Paper   bibtex
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In CODASPY, September 2014.
KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection [pdf]Paper   bibtex
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. Rawat, S.; Mounier, L.; and Potet, M. In ARES, September 2014.
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis [pdf]Paper   bibtex
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Giuffrida, C.; Majdanik, K.; Conti, M.; and Bos, H. In DIMVA, September 2014.
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [pdf]Paper   bibtex
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables). Slowinska, A.; Haller, I.; Bacs, A.; Baranga, S.; and Bos, H. In DIMVA, September 2014.
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables) [pdf]Paper   bibtex
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation. Stamatogiannakis, M.; Groth, P.; and Bos, H. In IPAW, September 2014.
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation [pdf]Paper   bibtex
Towards Optimal Scheduling of Multiserver System Components. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In MOS, September 2014.
Towards Optimal Scheduling of Multiserver System Components [pdf]Paper   bibtex
On measuring the impact of DDoS botnets. Welzel, A.; Rossow, C.; and Bos, H. In EuroSec, September 2014.
On measuring the impact of DDoS botnets [pdf]Paper   bibtex
Enter Sandbox: Android Sandbox Comparison. Neuner, S.; van der Veen, V.; Lindorfer, M.; Huber, M.; Merzdovnik, G.; Mulazzani, M.; and Weippl, E. In MoST, September 2014.
Enter Sandbox: Android Sandbox Comparison [pdf]Paper   bibtex
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors. Lindorfer, M.; Neugschwandtner, M.; Weichselbaum, L.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. In BADGERS, September 2014.
ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors [pdf]Paper   bibtex
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. In EDCC, September 2014.
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments [pdf]Paper   bibtex
Instruction-Level Steganography for Covert Trigger-Based Malware. Andriesse, D.; and Bos, H. In DIMVA, September 2014.
Instruction-Level Steganography for Covert Trigger-Based Malware [pdf]Paper   bibtex
Safe and Automatic Live Update. Giuffrida, C. Ph.D. Thesis, VU Amsterdam, August 2014. EuroSys Roger Needham PhD Award, SIGOPS Dennis M. Ritchie Award
Safe and Automatic Live Update [pdf]Paper   bibtex
Andrubis: Android Malware under the Magnifying Glass. Weichselbaum, L.; Neugschwandtner, M.; Lindorfer, M.; Fratantonio, Y.; van der Veen, V.; and Platzer, C. Technical Report August 2014.
Andrubis: Android Malware under the Magnifying Glass [pdf]Paper   bibtex
  2013 (22)
Safe and Automatic Live Update for Operating Systems. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In ASPLOS, December 2013.
Safe and Automatic Live Update for Operating Systems [pdf]Paper   bibtex
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Rossow, C.; Andriesse, D.; Werner, T.; Stone-Gross, B.; Dietrich, C. J.; and Bos, H. In S&P, December 2013.
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets [pdf]Paper   bibtex
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H. In USENIX Security, December 2013.
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations [pdf]Paper   bibtex
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In USENIX ATC, November 2013.
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems [pdf]Paper   bibtex
Practical Automated Vulnerability Monitoring Using Program State Invariants. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S. In DSN, October 2013.
Practical Automated Vulnerability Monitoring Using Program State Invariants [pdf]Paper   bibtex
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. Giuffrida, C.; Iorgulescu, C.; Kuijsten, A.; and Tanenbaum, A. S. In LISA, October 2013. Best Student Paper Award
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer [pdf]Paper   bibtex
Scalable Virtual Machine Deployment Using VM Image Caches. Razavi, K.; and Kielmann, T. In SC, October 2013.
Scalable Virtual Machine Deployment Using VM Image Caches [pdf]Paper   bibtex
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries. Chen, X.; Slowinska, A.; and Bos, H. In WCRE, September 2013. Best Paper Award
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries [pdf]Paper   bibtex
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Razavi, K.; Razorea, L. M.; and Kielmann, T. In DIHC, September 2013.
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation [pdf]Paper   bibtex
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In WCRE, September 2013.
LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection [pdf]Paper   bibtex
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming. Rawat, S.; Duchene, F.; Groz, R.; and Richier, J. In CICS, September 2013.
Evolving Indigestible Codes: Fuzzing Interpreters with Genetic Programming [link]Paper   bibtex
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. Grieco, G.; Mounier, L.; Potet, M.; and Rawat, S. In ICSTW, September 2013.
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis [pdf]Paper   bibtex
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In PRDC, September 2013.
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments [pdf]Paper   bibtex
Unprivileged Black-Box Detection of User-Space Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. TDSC, 10(1). September 2013.
Unprivileged Black-Box Detection of User-Space Keyloggers [pdf]Paper   bibtex
MemPick: Data Structure Detection in C/C++ Binaries. Haller, I.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
MemPick: Data Structure Detection in C/C++ Binaries [pdf]Paper   bibtex
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. Andriesse, D.; Rossow, C.; Stone-Gross, B.; Plohmann, D.; and Bos, H. In MALWARE, September 2013.
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus [pdf]Paper   bibtex
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   bibtex
Combining Static and Dynamic Analysis for Vulnerability Detection. Rawat, S.; Ceara, D.; Mounier, L.; and Potet, M. Technical Report August 2013.
Combining Static and Dynamic Analysis for Vulnerability Detection [link]Paper   bibtex
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz. Duchene, F.; Rawat, S.; Richier, J.; Groz, R.; and others In SSTIC, August 2013.
Fuzzing Intelligent de XSS Type-2 Filtrés selon Darwin: KameleonFuzz [link]Paper   bibtex
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering. Duchene, F.; Rawat, S.; Richier, J.; and Groz, R. In NSC, August 2013.
A Hesitation Step into the Blackbox: Heuristic Based Web-Application Reverse-Engineering [link]Paper   bibtex
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications. Pierre, G.; Kielmann, T.; Rocca, E.; Razavi, K; IJff, B.; Fernandez, H.; Figueiredo, R.; Uta, A.; Vintila, A.; Oprescu, A.; Schuett, T.; Berlin, M.; Artac, M.; and Cernivec, A. In HPDC (poster), August 2013.
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications [pdf]Paper   bibtex
Dynamic Analysis of Android Malware. van der Veen, V.; Bos, H.; and Rossow, C. Ph.D. Thesis, August 2013.
Dynamic Analysis of Android Malware [pdf]Paper   bibtex
  2012 (11)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Rossow, C.; Dietrich, C. J.; Grier, C.; Kreibich†, C.; Paxson†, V.; Pohlmann, N.; Bos, H.; and Steen, M. v. In S&P, December 2012.
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook [pdf]Paper   bibtex
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In USENIX Security, December 2012.
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [pdf]Paper   bibtex
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Slowinska, A.; Stancescu, T.; and Bos, H. In USENIX ATC, November 2012.
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation [pdf]Paper   bibtex
Keep Net Working - On a Dependable and Fast Networking Stack. Hruby, T.; Vogt, D.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2012.
Keep Net Working - On a Dependable and Fast Networking Stack [pdf]Paper   bibtex
Memory Errors: The Past, the Present, and the Future. van der Veen, V.; Dutt-Sharma, N.; Cavallaro, L.; and Bos, H. In RAID, October 2012.
Memory Errors: The Past, the Present, and the Future [pdf]Paper   bibtex
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. Duchene, F.; Groz, R.; Rawat, S.; and Richier, J. In ICST, September 2012.
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing [pdf]Paper   bibtex
Finding Buffer Overflow Inducing Loops in Binary Executables. Rawat, S.; and Mounier, L. In SERE, September 2012.
Finding Buffer Overflow Inducing Loops in Binary Executables [pdf]Paper   bibtex
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions. Giuffrida, C.; Ortolani, S.; and Crispo, B. In ASIACCS, September 2012.
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions [pdf]Paper   bibtex
Safe and Automated State Transfer for Secure and Reliable Live Update. Giuffrida, C.; and Tanenbaum, A. In HotSwUp, September 2012.
Safe and Automated State Transfer for Secure and Reliable Live Update [pdf]Paper   bibtex
System-level Support for Intrusion Recovery. Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H. In DIMVA, September 2012.
System-level Support for Intrusion Recovery [pdf]Paper   bibtex
Using Information Flow Tracking to Protect Legacy Binaries. Slowinska, A. Ph.D. Thesis, VU Amsterdam, May 2012. EuroSys Roger Needham PhD Award
Using Information Flow Tracking to Protect Legacy Binaries [link]Paper   bibtex
  2011 (8)
Application-Tailored I/O with Streamline. de Bruijn, W.; Bos, H.; and Bal, H. TOCS, 29(2): 6:1–6:33. December 2011.
Application-Tailored I/O with Streamline [pdf]Paper   bibtex
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Slowinska, A.; Stancescu, T.; and Bos, H. In NDSS, November 2011.
Howard: A Dynamic Excavator for Reverse Engineering Data Structures [pdf]Paper   bibtex
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2011.
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware [pdf]Paper   bibtex
Minemu: The World's Fastest Taint Tracker. Bosman, E.; Slowinska, A.; and Bos, H. In RAID, October 2011.
Minemu: The World's Fastest Taint Tracker [pdf]Paper   bibtex
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments. D'Angelo, C. A.; Giuffrida, C.; and Abramo, G. JASIST, 62(2). September 2011.
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments [pdf]Paper   bibtex
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. Rawat, S.; and Mounier, L. In ICSTW, September 2011.
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results [pdf]Paper   bibtex
On Botnets that Use DNS for Command and Control. Dietrich, C. J.; Rossow, C.; Freiling, F. C.; Bos, H.; Steen, M. v.; and Pohlmann, N. In EC2ND, September 2011.
On Botnets that Use DNS for Command and Control [pdf]Paper   bibtex
System Security at VU University Amsterdam. Bos, H.; Cavallaro, L.; and Tanenbaum, A. S. In SysSec Workshop, August 2011.
System Security at VU University Amsterdam [pdf]Paper   bibtex
  2010 (11)
Bait Your Hook: A Novel Detection Technique for Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2010.
Bait Your Hook: A Novel Detection Technique for Keyloggers [pdf]Paper   bibtex
Paranoid Android: Versatile Protection For Smartphones. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; and Bos, H. In ACSAC, October 2010.
Paranoid Android: Versatile Protection For Smartphones [pdf]Paper   bibtex
Building a Dependable Operating System: Fault Tolerance in MINIX 3. Herder, J. Ph.D. Thesis, VU Amsterdam, September 2010. EuroSys Roger Needham PhD Award
Building a Dependable Operating System: Fault Tolerance in MINIX 3 [link]Paper   bibtex
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light. Rawat, S.; and Mounier, L. In EC2ND, September 2010.
An Evolutionary Computing Approach for Hunting Buffer Overflow Vulnerabilities: A Case of Aiming in Dim Light [pdf]Paper   bibtex
We Crashed, Now What?. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S In HotDep, September 2010.
We Crashed, Now What? [pdf]Paper   bibtex
Pointer Tainting Still Pointless: (But We All See the Point of Tainting). Slowinska, A.; and Bos, H. OSR, 44(3): 88–92. September 2010.
Pointer Tainting Still Pointless: (But We All See the Point of Tainting) [pdf]Paper   bibtex
DDE: Dynamic Data Structure Excavation. Slowinska, A.; Stancescu, T.; and Bos, H. In APSYS, September 2010.
DDE: Dynamic Data Structure Excavation [pdf]Paper   bibtex
A Gossip-based Churn Estimator for Large Dynamic Networks. Giuffrida, C.; and Ortolani, S. In ASCI, August 2010.
A Gossip-based Churn Estimator for Large Dynamic Networks [pdf]Paper   bibtex
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). August 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   bibtex
A Taxonomy of Live Updates. Giuffrida, C.; and Tanenbaum, A. S. In ASCI, August 2010.
A Taxonomy of Live Updates [pdf]Paper   bibtex
Adaptive Operating System Design for High Throughput I/O. de Bruijn, W. Ph.D. Thesis, VU Amsterdam, January 2010. EuroSys Roger Needham PhD Award
Adaptive Operating System Design for High Throughput I/O [link]Paper   bibtex
  2009 (8)
Pointless Tainting? Evaluating the Practicality of Pointer Tainting. Slowinska, A.; and Bos, H. In EuroSys, December 2009.
Pointless Tainting? Evaluating the Practicality of Pointer Tainting [pdf]Paper   bibtex
Fault Isolation for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2009.
Fault Isolation for Device Drivers [pdf]Paper   bibtex
Application Security Code Analysis: A Step Towards Software Assurance. Rawat, S.; and Saxena, A. IJICS, 3(1): 86–110. September 2009.
Application Security Code Analysis: A Step Towards Software Assurance [link]Paper   bibtex
Danger Theory Based SYN Flood Attack Detection in Autonomic Network. Rawat, S.; and Saxena, A. In SIN, September 2009.
Danger Theory Based SYN Flood Attack Detection in Autonomic Network [link]Paper   bibtex
Cooperative Update: A New Model for Dependable Live Update. Giuffrida, C.; and Tanenbaum, A. S. In HotSwUp, September 2009.
Cooperative Update: A New Model for Dependable Live Update [pdf]Paper   bibtex
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC. Bos, H.; and Huang, K. In ANCS, September 2009.
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC [pdf]Paper   bibtex
Mapping and Synchronizing Streaming Applications on Cell Processors. Nijhuis, M.; Bos, H.; Bal, H.; and Augonnet, C. In HiPEAC, September 2009.
Mapping and Synchronizing Streaming Applications on Cell Processors [pdf]Paper   bibtex
Prepare to Die: A New Paradigm for Live Update. Giuffrida, C.; and Tanenbaum, A. Technical Report VU Amsterdam, August 2009.
Prepare to Die: A New Paradigm for Live Update [pdf]Paper   bibtex
  2008 (7)
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Portokalidis, G.; and Bos, H. In EuroSys, December 2008.
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits [pdf]Paper   bibtex
Beltway Buffers: Avoiding the OS Traffic Jam. Bruijn, W. d.; and Bos, H. In INFOCOM, November 2008.
Beltway Buffers: Avoiding the OS Traffic Jam [pdf]Paper   bibtex
PipesFS: Fast Linux I/O in the Unix Tradition. Bruijn, W. d.; and Bos, H. OSR. September 2008.
PipesFS: Fast Linux I/O in the Unix Tradition [pdf]Paper   bibtex
Safe Execution of Untrusted Applications on Embedded Network Processors. Bos, H.; Samwel, B.; Cristea, M.; and Anagnostakis, K. IJES, 4(3). September 2008.
Safe Execution of Untrusted Applications on Embedded Network Processors [pdf]Paper   bibtex
Model-T: Rethinking the OS for Terabit Speeds. Bruijn, W. d.; and Bos, H. In HSN, September 2008.
Model-T: Rethinking the OS for Terabit Speeds [pdf]Paper   bibtex
Future Threats to Future Trust. Bos, H.; Ioannidis, S.; Jonsson, E.; Kirda, E.; and Kruegel, C. In FTC, September 2008.
Future Threats to Future Trust [pdf]Paper   bibtex
Countering IPC Threats in Multiserver Operating Systems. Herder, J.; Bos, H.; Homburg, P.; Gras, B.; and Tanenbaum, A. S. In PRDC, September 2008.
Countering IPC Threats in Multiserver Operating Systems [pdf]Paper   bibtex
  2007 (10)
Failure Resilience for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2007. William C. Carter Award
Failure Resilience for Device Drivers [pdf]Paper   bibtex
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Slowinska, A.; and Bos, H. In ACSAC, October 2007.
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack [pdf]Paper   bibtex
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms. Sastry, C. S.; Rawat, S.; Pujari, A. K.; and Gulati, V. P. Information Sciences, 177(23). September 2007.
Network Traffic Analysis Using Singular Value Decomposition and Multiscale Transforms [link]Paper   bibtex
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting. Valkering, M.; Slowinska, A.; and Bos, H. In EC2ND, September 2007.
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [pdf]Paper   bibtex
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Cristea, M.; Gommans, L.; Xu, L.; and Bos, H. In Networking, September 2007.
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [pdf]Paper   bibtex
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications. Nijhuis, M.; Bos, H.; and Bal, H. In ICPP, September 2007.
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications [pdf]Paper   bibtex
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots. Portokalidis, G.; and Bos, H. Computer Networks, 51(5). September 2007.
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots [pdf]Paper   bibtex
Ruler: Easy Packet Matching and Rewriting on Network Processors. Hruby, T.; Reeuwijk, K. v.; and Bos, H. In ANCS, September 2007.
Ruler: Easy Packet Matching and Rewriting on Network Processors [pdf]Paper   bibtex
Roadmap to a Failure-Resilient Operating System. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 32(1). August 2007. 00010
Roadmap to a Failure-Resilient Operating System [pdf]Paper   bibtex
Use of Dimensionality Reduction for Intrusion Detection. Dash, S. K.; Rawat, S.; and Pujari, A. K. In Information Systems Security. August 2007.
Use of Dimensionality Reduction for Intrusion Detection [link]Paper   bibtex