Victor van der Veen

According to our database1, Victor van der Veen authored at least 17 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
BLACKSMITH: Scalable Rowhammering in the Frequency Domain.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

2020
TRRespass: Exploiting the Many Sides of Target Row Refresh.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
When Memory Serves Not So Well - Memory Errors 30 Years Later.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
MARX: Uncovering Class Hierarchies in C++ Programs.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.
Proceedings of the 25th USENIX Security Symposium, 2016

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.
Proceedings of the Financial Cryptography and Data Security, 2016

DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Practical Context-Sensitive CFI.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Enter Sandbox: Android Sandbox Comparison.
CoRR, 2014

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2012
Memory Errors: The Past, the Present, and the Future.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012


  Loading...