Follow
Per Larsen
Per Larsen
Immunant, Inc.
Verified email at immunant.com - Homepage
Title
Cited by
Cited by
Year
SoK: Automated software diversity
P Larsen, A Homescu, S Brunthaler, M Franz
2014 IEEE Symposium on Security and Privacy, 276-291, 2014
4932014
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
3962017
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
3332015
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2482015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2172015
Thwarting cache side-channel attacks through dynamic software diversity.
S Crane, A Homescu, S Brunthaler, P Larsen, M Franz
NDSS, 8-11, 2015
2062015
Profile-guided automated software diversity
A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013
1972013
SoK: Sanitizing for security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019
1962019
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1742015
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1252016
Librando: transparent code randomization for just-in-time compilers
A Homescu, S Brunthaler, P Larsen, M Franz
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013
1152013
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz
WOOT 12, 64-76, 2012
1002012
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
922017
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016
842016
Booby trapping software
S Crane, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013
772013
Diversifying the software stack using randomized NOP insertion
T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz
Moving Target Defense II: Application of Game Theory and Adversarial …, 2013
722013
Security through diversity: Are we there yet?
P Larsen, S Brunthaler, M Franz
IEEE Security & Privacy 12 (2), 28-35, 2013
662013
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
632016
Selfrando: Securing the tor browser against de-anonymization exploits
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proceedings on Privacy Enhancing Technologies, 2016
632016
PKRU-Safe: Automatically locking down the heap between safe and unsafe languages
P Kirth, M Dickerson, S Crane, P Larsen, A Dabrowski, D Gens, Y Na, ...
Proceedings of the Seventeenth European Conference on Computer Systems, 132-148, 2022
582022
The system can't perform the operation now. Try again later.
Articles 1–20