USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 23 results:
Filters: Author is Herbert Bos [Clear All Filters]
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. 32nd USENIX Security Symposium (USENIX Security 23). :805--822.
.
2023. Uncontained: Uncovering Container Confusion in the Linux Kernel. 32nd USENIX Security Symposium (USENIX Security 23). :5055--5072.
.
2023. Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. 31st USENIX Security Symposium (USENIX Security 22). :971--988.
.
2022. DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. 20th USENIX Conference on File and Storage Technologies (FAST 22). :281--296.
.
2022. TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. 31st USENIX Security Symposium (USENIX Security 22). :989--1007.
.
2022. Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. 30th USENIX Security Symposium (USENIX Security 21). :1451--1468.
.
2021. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. 30th USENIX Security Symposium (USENIX Security 21). :1001--1018.
.
2021. ParmeSan: Sanitizer-guided Greybox Fuzzing. 29th USENIX Security Symposium (USENIX Security 20). :2289--2306.
.
2020. Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. 27th USENIX Security Symposium (USENIX Security 18). :937--954.
.
2018. Throwhammer: Rowhammer Attacks over the Network and Defenses. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :213--226.
.
2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. 27th USENIX Security Symposium (USENIX Security 18). :955--972.
.
2018. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). :697--710.
.
2018. Flip Feng Shui: Hammering a Needle in the Software Stack. 25th USENIX Security Symposium (USENIX Security 16). :1--18.
.
2016. An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. 25th USENIX Security Symposium (USENIX Security 16). :583--600.
.
2016. Poking Holes in Information Hiding. 25th USENIX Security Symposium (USENIX Security 16). :121--138.
.
2016. Undermining Information Hiding (and What to Do about It). 25th USENIX Security Symposium (USENIX Security 16). :105--119.
.
2016. Decoupling Provenance Capture and Analysis from Execution. 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15).
.
2015. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. 23rd USENIX Security Symposium (USENIX Security 14). :417--432.
.
2014. On Sockets and System Calls: Minimizing Context Switches for the Socket API. 2014 Conference on Timely Results in Operating Systems (TRIOS 14).
.
2014. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. 22nd USENIX Security Symposium (USENIX Security 13). :49--64.
.
2013. When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems. 2013 USENIX Annual Technical Conference (USENIX ATC 13). :255--266.
.
2013. Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. 2012 USENIX Annual Technical Conference (USENIX ATC 12). :125--137.
.
2012. FFPF: Fairly Fast Packet Filters. 6th Symposium on Operating Systems Design & Implementation (OSDI 04).
.
2004.