Julian Horsch

Orcid: 0000-0001-9018-7048

According to our database1, Julian Horsch authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cherifying Linux: A Practical View on using CHERI.
Proceedings of the 17th European Workshop on Systems Security, 2024

SoftBound+CETS Revisited: More Than a Decade Later.
Proceedings of the 17th European Workshop on Systems Security, 2024

2023
CryptSan: Leveraging ARM Pointer Authentication for Memory Safety in C/C++.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

2022
PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C/C++.
CoRR, 2022

2021
Compiler-based Attack Origin Tracking with Dynamic Taint Analysis.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

MESH: A Memory-Efficient Safe Heap for C/C++.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
Freeze and Crypt: Linux kernel support for main memory encryption.
Comput. Secur., 2019

Extracting Secrets from Encrypted Virtual Machines.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
SEVered: Subverting AMD's Virtual Machine Encryption.
Proceedings of the 11th European Workshop on Systems Security, 2018

A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM Hypervisor.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Freeze & Crypt: Linux Kernel Support for Main Memory Encryption.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Protecting Suspended Devices from Memory Attacks.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
CoKey: fast token-based cooperative cryptography.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM Hypervisor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Secure Architecture for Operating System-Level Virtualization on Mobile Devices.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
SobrTrA: a software-based trust anchor for ARM cortex application processors.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

TrustID: trustworthy identities for untrusted mobile devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014


  Loading...