Stijn Volckaert

Orcid: 0000-0001-5594-7742

According to our database1, Stijn Volckaert authored at least 31 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
You shall not (by)pass!: practical, secure, and fast PKU-based sandboxing.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Sharing is caring: secure and efficient shared memory support for MVEEs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

PKRU-safe: automatically locking down the heap between safe and unsafe languages.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
KALD: Detecting Direct Pointer Disclosure Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2021

Garmr: Defending the gates of PKU-based sandboxing.
CoRR, 2021

dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

Randomization-based Defenses against Data-Oriented Attacks.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

2020
NoJITsu: Locking Down JavaScript Engines.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

BinRec: dynamic binary lifting and recompilation.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

Distributed Heterogeneous N-Variant Execution.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

CoDaRR: Continuous Data Space Randomization against Data-Only Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
DMON: A Distributed Heterogeneous N-Variant System.
CoRR, 2019

SoK: Sanitizing for Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Cheat Protection in Online Games.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

2018
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Hardware Assisted Randomization of Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization.
Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018

Bytecode Corruption Attacks Are Real - And How to Defend Against Them.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Multi-variant execution environments.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Venerable Variadic Vulnerabilities Vanquished.
Proceedings of the 26th USENIX Security Symposium, 2017

Taming Parallelism in a Multi-Variant Execution Environment.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution.
IEEE Trans. Dependable Secur. Comput., 2016

Multi-Variant Execution of Parallel Programs.
CoRR, 2016

Secure and Efficient Application Monitoring and Replication.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Tightly-coupled self-debugging software protection.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Obfuscating Windows DLLs.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2012
DNS Tunneling for Network Penetration.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

GHUMVEE: Efficient, Effective, and Flexible Replication.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012


  Loading...