Jannik Pewny

According to our database1, Jannik Pewny authored at least 8 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2017
Cross-architecture bug search in binary executables.
it Inf. Technol., 2017

Breaking and Fixing Destructive Code Read Defenses.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
EvilCoder: automated bug insertion.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
Evaluating the Effectiveness of Current Anti-ROP Defenses.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Leveraging semantic signatures for bug search in binary programs.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Control-flow restrictor: compiler-based CFI for iOS.
Proceedings of the Annual Computer Security Applications Conference, 2013


  Loading...