REACT REACT

Deliverables

  • Deliverable D7.1: Website and Collaboration Tools (August 2018) Icon pdf (1.9 MB)

Publications in Journals & Conferences

  1. Kouwe, Erik van der, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida. SoK: Benchmarking Flaws in Systems Security. In Proceedings 4th IEEE European Symposium on Security and Privacy (EuroS&P 2019). Stockholm, Sweden. June, 2019. Icon pdf (286.3 KB)
  2. Constantinos Diomedous and Elias Athanasopoulos. Practical Password Hardening based on TLS. In Proceedings of the 16th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). Gothenburg, Sweden, June 2019. Icon pdf (378.5 KB)
  3. Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos. Cookie synchronization: Everything you always wanted to know but were afraid to ask. In Proceedings of the 28th International Conference on World Wide Web (WWW). San Fransisco, USA. May 2019. Icon pdf (2.3 MB)
  4. Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. In Proceedings of the 40th IEEE Symposium on Security and Privacy. San Francisco, USA. May 2019. Icon pdf (3.4 MB)
  5. Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. RIDL: Rogue In-Flight Data Load. In Proceedings of the 40th IEEE Symposium on Security and Privacy. San Francisco, CA. May 2019. Icon pdf (1.4 MB)
  6. Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis. REAPER: Real-time App Analysis for Augmenting the Android Permission System. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY). Dallas, TX, USA. March, 2019. Icon pdf (1.2 MB)
  7. Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida. ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations. In Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2019). Providence, RI, USA. April, 2019. Icon pdf (856.4 KB)
  8. Österlund, Sebastian, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, and Cristiano Giuffrida. KMVX: Detecting Kernel Information Leaks with Multi-Variant Execution. In Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2019). Providence, RI, USA. April, 2019. Icon pdf (700.2 KB)
  9. Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, USA. February, 2019. Icon pdf (1.6 MB)
  10. Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert. NAUTILUS: Fishing for Deep Bugs with Grammars. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, USA. February, 2019. Icon pdf (697.2 KB)
  11. Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos Markatos, Sotiris Ioannidis, Giorgos Vasiliadis. Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. In Proceedings of the the Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, USA. February, 2019. Icon pdf (799.0 KB)
  12. Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero. Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, USA. February, 2019.  Icon pdf (322.7 KB)
  13. Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos. TIFF: Using Input Type Inference To Improve Fuzzing. In Proceedings of the 2018 Annual Computer Security Applications Conference (ACSAC). San Juan, Puerto Rico, USA. December 2018. Icon pdf (623.1 KB)
  14. Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz. Towards Automated Generation of Exploitation Primitives for Web Browsers. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC 18). San Juan, Puerto Rico, USA. December 2018. Icon pdf (2.3 MB)
  15. Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida. Type-After-Type: Practical and Complete Type-Safe Memory Reuse. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC 18). San Juan, Puerto Rico, USA. December 2018. Icon pdf (813.3 KB)
  16. Yun Shen, Enrico Mariconti, Pierre Antoine Vervier, Gianluca Stringhini. Tiresias: Predicting Security Events Through Deep Learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS 2018). Toronto, Canada. October, 2018. Icon pdf (2.8 MB)
  17. Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). Carlsbad, CA, USA. October, 2018. Icon pdf (372.3 KB)
  18. Andrei Tatar, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. Defeating Software Mitigations against Rowhammer: a Surgical Precision Hammer. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018). Heraklion, Crete, Greece. September, 2018. Icon pdf (515.3 KB)
  19. Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi. Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, USA. August, 2018. Icon pdf (1.0 MB)
  20. Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, USA. August, 2018. Icon pdf (1.5 MB)
  21. Robert Gawlik, Thorsten Holz. SoK: Make JIT-Spray Great Again. In Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 18). Baltimore, MD, USA. August. 2018. Icon pdf (213.4 KB)