Enes Göktas

Orcid: 0009-0000-4988-7229

According to our database1, Enes Göktas authored at least 12 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SYSPART: Automated Temporal System Call Filtering for Binaries.
CoRR, 2023

SysPart: Automated Temporal System Call Filtering for Binaries.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2020
Speculative Probing: Hacking Blind in the Spectre Era.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Evaluating control-flow restricting defenses.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Undermining Information Hiding (and What to Do about It).
Proceedings of the 25th USENIX Security Symposium, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Practical Context-Sensitive CFI.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

ShrinkWrap: VTable Protection without Loose Ends.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Out of Control: Overcoming Control-Flow Integrity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014


  Loading...