Erick Bauman

Orcid: 0009-0004-4804-4261

According to our database1, Erick Bauman authored at least 14 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Renewable Just-In-Time Control-Flow Integrity.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Do Head-Mounted Augmented Reality Devices Affect Muscle Activity and Eye Strain of Utility Workers Who Do Procedural Work? Studies of Operators and Manhole Workers.
Hum. Factors, 2022

2020
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Proceedings of the 29th USENIX Security Symposium, 2020

Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020

2019
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Smart Contract Defense through Bytecode Rewriting.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

SGXElide: enabling enclave code secrecy via self-modification.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

2017
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

SGX-Log: Securing System Logs With SGX.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A Case for Protecting Computer Games With SGX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

2015
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions.
ACM Comput. Surv., 2015

You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

Half a Century of Practice: Who Is Still Storing Plaintext Passwords?
Proceedings of the Information Security Practice and Experience, 2015


  Loading...