Lucas Davi

Orcid: 0000-0002-7322-2777

Affiliations:
  • University of Duisburg-Essen, Institute for Computer Science and Business Information Systems (ICB), Essen, Germany


According to our database1, Lucas Davi authored at least 71 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.
Proceedings of the 32nd USENIX Security Symposium, 2023

EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Fuzz on the Beach: Fuzzing Solana Smart Contracts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Practical Mitigation of Smart Contract Bugs.
CoRR, 2022

SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Proceedings of the 31st USENIX Security Symposium, 2022

Tutorial: Analyzing, Exploiting, and Patching Smart Contracts in Ethereum.
Proceedings of the IEEE Secure Development Conference, 2022

Salsa: SGX Attestation for Live Streaming Applications.
Proceedings of the IEEE Secure Development Conference, 2022

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

HERA: Hotpatching of Embedded Real-time Applications.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers.
Proceedings of the Computer Security - ESORICS 2021, 2021


RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Control Behavior Integrity for Distributed Cyber-Physical Systems.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

2019
Combining Safety and Security in Autonomous Cars Using Blockchain Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019

2018
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

K-Miner: Uncovering Memory Corruption in Linux.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

Hardware control flow integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Execution Integrity with In-Place Encryption.
CoRR, 2017

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

Breaking and Fixing Destructive Code Read Defenses.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
The Cybersecurity Landscape in Industrial Control Systems.
Proc. IEEE, 2016

SandBlaster: Reversing the Apple Sandbox.
CoRR, 2016

CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Leakage-Resilient Layout Randomization for Mobile Devices.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015

Building Secure Defenses Against Code-Reuse Attacks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-25546-0, 2015

Code-reuse attacks and defenses.
PhD thesis, 2015

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

HAFIX: hardware-assisted flow integrity extension.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

XiOS: Extended Application Sandboxing on iOS.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

PSiOS: bring your own privacy & security to iOS devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Towards Taming Privilege-Escalation Attacks on Android.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
ROPdefender: a detection tool to defend against return-oriented programming attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Trusted virtual domains on OKL4: secure information sharing on smartphones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Practical and lightweight domain isolation on Android.
Proceedings of the SPSM'11, 2011

Poster: the quest for security against privilege escalation attacks on android.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Scalable trust establishment with software reputation.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Privilege Escalation Attacks on Android.
Proceedings of the Information Security - 13th International Conference, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009


  Loading...