David Gens

According to our database1, David Gens authored at least 24 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
MCAD: Beyond Basic-Block Throughput Estimation Through Differential, Instruction-Level Tracing.
CoRR, 2022

PKRU-safe: automatically locking down the heap between safe and unsafe languages.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
V0LTpwn: Attacking x86 Processor Integrity from Software.
Proceedings of the 29th USENIX Security Symposium, 2020

NoJITsu: Locking Down JavaScript Engines.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

BinRec: dynamic binary lifting and recompilation.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

CoDaRR: Continuous Data Space Randomization against Data-Only Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
OS-level Attacks and Defenses: from Software to Hardware-based Exploits.
PhD thesis, 2019

FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptol. ePrint Arch., 2019

HardFails: Insights into Software-Exploitable Hardware Bugs.
Proceedings of the 28th USENIX Security Symposium, 2019

SANCTUARY: ARMing TrustZone with User-space Enclaves.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
CoRR, 2018

K-Miner: Uncovering Memory Corruption in Linux.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

OS-level Software & Hardware Attacks and Defenses.
Proceedings of the 2018 MobiSys 2018 Ph.D. Forum, Munich, Germany, June 10, 2018, 2018

It's hammer time: how to attack (rowhammer-based) DRAM-PUFs.
Proceedings of the 55th Annual Design Automation Conference, 2018

2017
Execution Integrity with In-Place Encryption.
CoRR, 2017

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

JITGuard: Hardening Just-in-time Compilers with SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016

2015
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015


  Loading...