Philipp Koppe

According to our database1, Philipp Koppe authored at least 12 papers between 2014 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

An Exploratory Analysis of Microcode as a Building Block for System Defenses.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Automated Generation of Exploitation Primitives for Web Browsers.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Interdiction in practice - Hardware Trojan against a high-security USB flash drive.
J. Cryptogr. Eng., 2017

Reverse Engineering x86 Processor Microcode.
Proceedings of the 26th USENIX Security Symposium, 2017

Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Breaking and Fixing Destructive Code Read Defenses.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Detile: Fine-Grained Information Leak Detection in Script Engines.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

2014
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...