Herbert Bos

According to our database1, Herbert Bos authored at least 150 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Malicious cryptocurrency miners: Status and Outlook.
CoRR, 2019

RIDL: Rogue In-Flight Data Load.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SoK: Benchmarking Flaws in Systems Security.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

kMVX: Detecting Kernel Information Leaks with Multi-variant Execution.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Benchmarking Crimes: An Emerging Threat in Systems Security.
CoRR, 2018

Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
Proceedings of the 27th USENIX Security Symposium, 2018

Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Throwhammer: Rowhammer Attacks over the Network and Defenses.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

On the Effectiveness of Code Normalization for Function Identification.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Towards Automated Vulnerability Scanning of Network Servers.
Proceedings of the 11th European Workshop on Systems Security, 2018

Delta pointers: buffer overflow checks without the checks.
Proceedings of the Thirteenth EuroSys Conference, 2018

Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Type-After-Type: Practical and Complete Type-Safe Memory Reuse.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

TIFF: Using Input Type Inference To Improve Fuzzing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Now You See Me: Real-time Dynamic Function Call Detection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Evaluating control-flow restricting defenses.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
PROV2R: Practical Provenance Analysis of Unstructured Processes.
ACM Trans. Internet Techn., 2017

Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

MARX: Uncovering Class Hierarchies in C++ Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

ASLR on the Line: Practical Cache Attacks on the MMU.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

VUzzer: Application-aware Evolutionary Fuzzing.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

DSIbin: identifying dynamic data structures in C/C++ binaries.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

No Need to Hide: Protecting Safe Regions on Commodity Hardware.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Compiler-Agnostic Function Detection in Binaries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.
Proceedings of the 10th European Workshop on Systems Security, 2017

Fast and Generic Metadata Management with Mid-Fat Pointers.
Proceedings of the 10th European Workshop on Systems Security, 2017

Off-the-shelf Embedded Devices as Platforms for Security Research.
Proceedings of the 10th European Workshop on Systems Security, 2017

JTR: A Binary Solution for Switch-Case Recovery.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Binary Rejuvenation: Applications and Challenges.
IEEE Security & Privacy, 2016

Scalable data structure detection and classification for C/C++ binaries.
Empirical Software Engineering, 2016

On the detection of custom memory allocators in C binaries.
Empirical Software Engineering, 2016

Flip Feng Shui: Hammering a Needle in the Software Stack.
Proceedings of the 25th USENIX Security Symposium, 2016

Poking Holes in Information Hiding.
Proceedings of the 25th USENIX Security Symposium, 2016

Undermining Information Hiding (and What to Do about It).
Proceedings of the 25th USENIX Security Symposium, 2016

An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.
Proceedings of the 25th USENIX Security Symposium, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Slick: an intrusion detection system for virtualized storage devices.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Software that Meets Its Intent.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

Trade-Offs in Automatic Provenance Capture.
Proceedings of the Provenance and Annotation of Data and Processes, 2016

How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.
Proceedings of the Financial Cryptography and Data Security, 2016

METAlloc: efficient and comprehensive metadata management for software security hardening.
Proceedings of the 9th European Workshop on System Security, 2016

IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming.
Proceedings of the Computer Security - ESORICS 2016, 2016

Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

A NEaT Design for Reliable and Scalable Network Stacks.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Identifying Dynamic Data Structures in Malware.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

TypeSan: Practical Type Confusion Detection.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Decoupling Provenance Capture and Analysis from Execution.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015

StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Speculative Memory Checkpointing.
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015

Reliable Recon in Adversarial Peer-to-Peer Botnets.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Lightweight Memory Checkpointing.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

"Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

The BORG: Nanoprobing Binaries for Buffer Overreads.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Practical Context-Sensitive CFI.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

ShrinkWrap: VTable Protection without Loose Ends.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

PIE: Parser Identification in Embedded Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Techniques for efficient in-memory checkpointing.
Operating Systems Review, 2014

Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Facilitating Trust on Data through Provenance.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Out of Control: Overcoming Control-Flow Integrity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Framing Signals - A Return to Portable Shellcode.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

On Sockets and System Calls: Minimizing Context Switches for the Socket API.
Proceedings of the 2014 Conference on Timely Results in Operating Systems, 2014

Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation.
Proceedings of the Provenance and Annotation of Data and Processes, 2014

On measuring the impact of DDoS botnets.
Proceedings of the Seventh European Workshop on System Security, 2014

Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

2013
Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities.
;login:, 2013

MemPick: A tool for data structure detection.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

MemPick: High-level data structure detection in C/C++ binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

MemBrush: A practical tool to detect custom memory allocators in C binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Who allocated my memory? Detecting custom memory allocators in C binaries.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Techniques for efficient in-memory checkpointing.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

2012
SysSec: Managing Threats and Vulnerabilities in the Future Internet.
ERCIM News, 2012

Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Memory Errors: The Past, the Present, and the Future.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Keep net working - on a dependable and fast networking stack.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Large-Scale Analysis of Malware Downloaders.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

System-Level Support for Intrusion Recovery.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2011
Application-Tailored I/O with Streamline.
ACM Trans. Comput. Syst., 2011

Minemu: The World's Fastest Taint Tracker.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Proceedings of the Network and Distributed System Security Symposium, 2011

On Botnets That Use DNS for Command and Control.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Systems Security at VU University Amsterdam.
Proceedings of the First SysSec Workshop 2011, 2011

Sandnet: network traffic analysis of malicious software.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
MINIX 3: Status Report and Current Research.
;login:, 2010

Pointer tainting still pointless: (but we all see the point of tainting).
Operating Systems Review, 2010

DDE: dynamic data structure excavation.
Proceedings of the 1st ACM SIGCOMM Asia-Pacific Workshop on Systems, 2010

Brief announcement: a shared disk on distributed storage.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Paranoid Android: versatile protection for smartphones.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Mapping and Synchronizing Streaming Applications on Cell Processors.
Proceedings of the High Performance Embedded Architectures and Compilers, 2009

Pointless tainting?: evaluating the practicality of pointer tainting.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

Fault isolation for device drivers.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
PipesFS: fast Linux I/O in the unix tradition.
Operating Systems Review, 2008

Safe execution of untrusted applications on embedded network processors.
IJES, 2008

Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability).
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Beltway Buffers: Avoiding the OS Traffic Jam.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Eudaemon: involuntary and on-demand emulation against zero-day exploits.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
Roadmap to a Failure-Resilient Operating System.
;login:, 2007

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots.
Computer Networks, 2007

The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

A Component-based Coordination Language for Efficient Reconfigurable Streaming Applications.
Proceedings of the 2007 International Conference on Parallel Processing (ICPP 2007), 2007

Failure Resilience for Device Drivers.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Ruler: high-speed packet matching and rewriting on NPUs.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007

The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Modular System Programming in MINIX 3.
;login:, 2006

File size distribution on UNIX systems: then and now.
Operating Systems Review, 2006

MINIX 3: a highly reliable, self-repairing operating system.
Operating Systems Review, 2006

Can We Make Operating Systems Reliable and Secure?
IEEE Computer, 2006

Dynamically extending the Corral with native code for high-speed packet processing.
Computer Networks, 2006

SafeCard: A Gigabit IPS on the Network Card.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

SP@CE - An SP-Based Programming Model for Consumer Electronics Streaming Applications.
Proceedings of the Languages and Compilers for Parallel Computing, 2006

Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

Supporting Reconfigurable Parallel Multimedia Applications.
Proceedings of the Euro-Par 2006, Parallel Processing, 12th International Euro-Par Conference, Dresden, Germany, August 28, 2006

Construction of a Highly Dependable Operating System.
Proceedings of the Sixth European Dependable Computing Conference, 2006

Reorganizing UNIX for Reliability.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006

2005
Robust Distributed Systems Achieving Self-Management through Inference.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

FPL-3E: Towards Language Support for Reconfigurable Packet Processing.
Proceedings of the Embedded Computer Systems: Architectures, 2005

Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

FPL-3: Towards Language Support for Distributed Packet Processing.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
FFPF: Fairly Fast Packet Filters.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Splash: SNMP Plus a Lightweight API for SNAP Handling.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks.
Proceedings of the Management of Multimedia Networks and Services, 2003

HOKES/POKES: Light-Weight Resource Sharing.
Proceedings of the Embedded Software, Third International Conference, 2003

2002
A perspective on how ATM lost control.
Computer Communication Review, 2002

The OKE Corral: Code Organisation and Reconfiguration at Runtime Using Active Linking.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

2000
Open Extensible Network Control.
J. Network Syst. Manage., 2000

1999
Application-Specific Policies: Beyond the Domain Boundaries.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

1998
Efficient reservations in open ATM network control using on-line measurements.
Int. J. Communication Systems, 1998


  Loading...