Raoul Strackx

According to our database1, Raoul Strackx authored at least 32 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

2019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.
IEEE Micro, 2019

Securely deploying distributed computation systems on peer-to-peer networks.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018

Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The Heisenberg Defense: Proactively Defending SGX Enclaves against Page-Table-Based Side-Channel Attacks.
CoRR, 2017

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution.
Proceedings of the 26th USENIX Security Symposium, 2017

Hardening Intel SGX Applications: Balancing Concerns.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

Automatically Generating Secure Wrappers for SGX Enclaves from Separation Logic Specifications.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017

2016
Ariadne: A Minimal Approach to State Continuity.
Proceedings of the 25th USENIX Security Symposium, 2016

Security Guarantees for the Execution Infrastructure of Software Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

Developing Secure SGX Enclaves: New Challenges on the Horizon.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Mitigating Password Database Breaches with Intel SGX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

2015
Secure Compilation to Protected Module Architectures.
ACM Trans. Program. Lang. Syst., 2015

Salus: Kernel Support for Secure Process Compartments.
EAI Endorsed Trans. Security Safety, 2015

Idea: Towards an Inverted Cloud.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Idea: State-Continuous Transfer of State in Protected-Module Architectures.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Security Primitives for Protected-Module Architectures Based on Program-Counter-Based Memory Access Control; Beveiligingsprimitieven voor softwaremodules die beschermd worden door geheugentoegangscontrole op basis van de programmateller.
PhD thesis, 2014

On the effectiveness of virtualization-based security.
CoRR, 2014

ICE: a passive, high-speed, state-continuity scheme.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege.
Proceedings of the Security and Privacy in Communication Networks, 2013

Protected Software Module Architectures.
Proceedings of the ISSE 2013, 2013

2012
Recent Developments in Low-Level Software Security.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Secure Compilation to Modern Processors.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Fides: selectively hardening software application components against kernel-level or process-level malware.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2010
Efficient and Effective Buffer Overflow Protection on ARM Processors.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Efficient Isolation of Trusted Subsystems in Embedded Systems.
Proceedings of the Security and Privacy in Communication Networks, 2010

2009
Breaking the memory secrecy assumption.
Proceedings of the Second European Workshop on System Security, 2009


  Loading...