Per Larsen

According to our database1, Per Larsen authored at least 63 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
PKRU-safe: automatically locking down the heap between safe and unsafe languages.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

2020
Distributed Heterogeneous N-Variant Execution.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Adoption Challenges of Code Randomization.
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020

2019
DMON: A Distributed Heterogeneous N-Variant System.
CoRR, 2019

SoK: Sanitizing for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Changing the Game of Software Security.
IEEE Secur. Priv., 2018

PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Hardware Assisted Randomization of Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Diversity and information leaks.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Large-Scale Automated Software Diversity - Program Evolution Redux.
IEEE Trans. Dependable Secur. Comput., 2017

Control-Flow Integrity: Precision, Security, and Performance.
ACM Comput. Surv., 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Thinking Inside the Box: Compartmentalized Garbage Collection.
ACM Trans. Program. Lang. Syst., 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016

Multi-Variant Execution of Parallel Programs.
CoRR, 2016

Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Code Randomization: Haven't We Solved This Problem Yet?
Proceedings of the IEEE Cybersecurity Development, 2016

Leakage-Resilient Layout Randomization for Mobile Devices.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015

Automatic Software Diversity.
IEEE Secur. Priv., 2015

Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

An Efficient and Generic Event-based Profiler Framework for Dynamic Languages.
Proceedings of the Principles and Practices of Programming on The Java Platform, 2015

Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Safe and efficient hybrid memory management for Java.
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Efficient hosted interpreters on the JVM.
ACM Trans. Archit. Code Optim., 2014

Genus zero graph segmentation: Estimation of intracranial volume.
Pattern Recognit. Lett., 2014

Security through Diversity: Are We There Yet?
IEEE Secur. Priv., 2014

Similarity-based matching meets Malware Diversity.
CoRR, 2014

SoK: Automated Software Diversity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Comparing points-to static analysis with runtime recorded profiling data.
Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, 2014

Accelerating iterators in optimizing AST interpreters.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Software Profiling Options and Their Effects on Security Based Diversification.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Diversifying the Software Stack Using Randomized NOP Insertion.
Proceedings of the Moving Target Defense II, 2013

Information flow tracking meets just-in-time compilation.
ACM Trans. Archit. Code Optim., 2013

Towards Precise and Efficient Information Flow Control in Web Browsers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

First-Class Labels: Using Information Flow to Debug Security Holes.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Efficient interpreter optimizations for the JVM.
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013

Booby trapping software.
Proceedings of the New Security Paradigms Workshop, 2013

CrowdFlow: Efficient Information Flow Security.
Proceedings of the Information Security, 16th International Conference, 2013

Profile-guided automated software diversity.
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013

Librando: transparent code randomization for just-in-time compilers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Parallelizing more Loops with Compiler Guided Refactoring.
Proceedings of the 41st International Conference on Parallel Processing, 2012

Fine-grained modularity and reuse of virtual machine components.
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012

2011
Expressing Coarse-Grain Dependencies Among Tasks in Shared Memory Programs.
IEEE Trans. Ind. Informatics, 2011

Automated quantification and analysis of facial asymmetry in children with arthritis in the temporomandibular joint.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

2010
Text Message Price Gouging: A Perfect Storm of Tacit Collusion.
J. Telecommun. High Technol. Law, 2010

Automated quantification and analysis of mandibular asymmetry.
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010

2009
Identifying Inter-task Communication in Shared Memory Programming Models.
Proceedings of the Evolving OpenMP in an Age of Extreme Parallelism, 2009

2007
Sparse Statistical Deformation Model for the Analysis of Craniofacial Malformations in the Crouzon Mouse.
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007

A Statistical Model of Head Asymmetry in Infants with Deformational Plagiocephaly.
Proceedings of the Image Analysis, 15th Scandinavian Conference, 2007

Craniofacial statistical deformation models of wild-type mice and Crouzon mice.
Proceedings of the Medical Imaging 2007: Image Processing, 2007

A Point-Wise Quantification of Asymmetry Using Deformation Fields: Application to the Study of the Crouzon Mouse Model.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2007, 10th International Conference, Brisbane, Australia, October 29, 2007

Estimation of Independent Non-Linear Deformation Modes for Analysis of Craniofacial Malformations in Crouzon Mice.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007


  Loading...