Follow
David Gens
Title
Cited by
Cited by
Year
SANCTUARY: ARMing TrustZone with User-space Enclaves.
F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf
NDSS, 2019
1612019
{CAn’t} touch this: Software-only mitigation against rowhammer attacks targeting kernel memory
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
26th USENIX Security Symposium (USENIX Security 17), 117-130, 2017
153*2017
{FastKitten}: Practical smart contracts on bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 801-818, 2019
1142019
{V0LTpwn}: Attacking x86 processor integrity from software
Z Kenjar, T Frassetto, D Gens, M Franz, AR Sadeghi
29th USENIX Security Symposium (USENIX Security 20), 1445-1461, 2020
992020
{HardFails}: Insights into {Software-Exploitable} Hardware Bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
28th USENIX Security Symposium (USENIX Security 19), 213-230, 2019
982019
Privately computing set-union and set-intersection cardinality via bloom filters
R Egert, M Fischlin, D Gens, S Jacob, M Senker, J Tillmanns
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
972015
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
L Davi, D Gens, C Liebchen, AR Sadeghi
NDSS, 2017
832017
K-Miner: Uncovering Memory Corruption in Linux.
D Gens, S Schmitt, L Davi, AR Sadeghi
NDSS, 2018
782018
Jitguard: hardening just-in-time compilers with sgx
T Frassetto, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
472017
BinRec: dynamic binary lifting and recompilation
A Altinay, J Nash, T Kroes, P Rajasekaran, D Zhou, A Dabrowski, D Gens, ...
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
452020
PKRU-Safe: Automatically locking down the heap between safe and unsafe languages
P Kirth, M Dickerson, S Crane, P Larsen, A Dabrowski, D Gens, Y Na, ...
Proceedings of the Seventeenth European Conference on Computer Systems, 132-148, 2022
362022
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
312017
Rip-rh: Preventing rowhammer-based inter-process attacks
C Bock, F Brasser, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
272019
CoDaRR: Continuous data space randomization against data-only attacks
P Rajasekaran, S Crane, D Gens, Y Na, S Volckaert, M Franz
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
252020
Nojitsu: Locking down javascript engines
T Park, K Dhondt, D Gens, Y Na, S Volckaert, M Franz
Proceedings 2020 Network and Distributed System Security Symposium, 2020
222020
It's hammer time: how to attack (rowhammer-based) DRAM-PUFs
S Zeitouni, D Gens, AR Sadeghi
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
172018
Execution integrity with in-place encryption
D Sullivan, O Arias, D Gens, L Davi, AR Sadeghi, Y Jin
arXiv preprint arXiv:1703.02698, 2017
102017
OS-level Attacks and Defenses: from Software to Hardware-based Exploits
D Gens
Technische Universität Darmstadt, 2019
62019
When a patch is not enough-hardfails: Software-exploitable hardware bugs
G Dessouky, D Gens, P Haney, G Persyn, A Kanuparthi, H Khattri, ...
arXiv preprint arXiv:1812.00197, 2018
52018
StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries
C Deshpande, D Gens, M Franz
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20