Stefan Brunthaler

Orcid: 0000-0001-9766-4871

Affiliations:
  • Bundeswehr University Munich, Germany
  • University of Paderborn, Germany (2016 - 2017)
  • University of California Irvine, CA, USA (2011 - 2015)
  • TU Wien, Vienna, Austria (PhD 2011)


According to our database1, Stefan Brunthaler authored at least 42 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage.
Proceedings of the Eighteenth European Conference on Computer Systems, 2023

2021
Multi-Level Quickening: Ten Years Later.
CoRR, 2021

Towards efficient and verified virtual machines for dynamic languages.
Proceedings of the CPP '21: 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2021

2018
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization.
Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018

2017
Large-Scale Automated Software Diversity - Program Evolution Redux.
IEEE Trans. Dependable Secur. Comput., 2017

Control-Flow Integrity: Precision, Security, and Performance.
ACM Comput. Surv., 2017

2016
Thinking Inside the Box: Compartmentalized Garbage Collection.
ACM Trans. Program. Lang. Syst., 2016

Time is on my side: Steganography in filesystem metadata.
Digit. Investig., 2016

Injecting CSP for Fun and Security.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015

Automatic Software Diversity.
IEEE Secur. Priv., 2015

Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

An Efficient and Generic Event-based Profiler Framework for Dynamic Languages.
Proceedings of the Principles and Practices of Programming on The Java Platform, 2015

Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Safe and efficient hybrid memory management for Java.
Proceedings of the 2015 ACM SIGPLAN International Symposium on Memory Management, 2015

2014
Efficient hosted interpreters on the JVM.
ACM Trans. Archit. Code Optim., 2014

Security through Diversity: Are We There Yet?
IEEE Secur. Priv., 2014

Similarity-based matching meets Malware Diversity.
CoRR, 2014

SoK: Automated Software Diversity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Comparing points-to static analysis with runtime recorded profiling data.
Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, 2014

Accelerating iterators in optimizing AST interpreters.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Software Profiling Options and Their Effects on Security Based Diversification.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Diversifying the Software Stack Using Randomized NOP Insertion.
Proceedings of the Moving Target Defense II, 2013

Information flow tracking meets just-in-time compilation.
ACM Trans. Archit. Code Optim., 2013

Speculative Staging for Interpreter Optimization.
CoRR, 2013

Towards Precise and Efficient Information Flow Control in Web Browsers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

First-Class Labels: Using Information Flow to Debug Security Holes.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Efficient interpreter optimizations for the JVM.
Proceedings of the 2013 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, 2013

ZipPy on truffle: a fast and simple implementation of python.
Proceedings of the SPLASH'13, 2013

Booby trapping software.
Proceedings of the New Security Paradigms Workshop, 2013

CrowdFlow: Efficient Information Flow Security.
Proceedings of the Information Security, 16th International Conference, 2013

Profile-guided automated software diversity.
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013

Librando: transparent code randomization for just-in-time compilers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Fine-grained modularity and reuse of virtual machine components.
Proceedings of the 11th International Conference on Aspect-oriented Software Development, 2012

2011
Compiler-Generated Software Diversity.
Proceedings of the Moving Target Defense, 2011

Interpreter Instruction Scheduling.
Proceedings of the Compiler Construction - 20th International Conference, 2011

2010
Efficient inline caching without dynamic translation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Inline Caching Meets Quickening.
Proceedings of the ECOOP 2010, 2010

Efficient interpretation using quickening.
Proceedings of the 6th Symposium on Dynamic Languages, 2010

2009
Virtual-Machine Abstraction and Optimization Techniques.
Proceedings of the Fourth Workshop on Bytecode Semantics, 2009


  Loading...