PUBLICATIONS

generated by bibbase.org
  2025 (2)
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks. de Faveri Tron, A.; Isemann, R.; Ragab, H.; Giuffrida, C.; von Gleissenthall, K.; and Bos, H. In USENIX Security, August 2025.
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks [pdf]Paper   Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks [link]Code   link   bibtex   42 downloads   Artifact Evaluation Badges:
LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing. Jemmett, A.; Geretto, E.; Bos, H.; and Giuffrida, C. In EuroS&P, June 2025.
link   bibtex  
  2024 (4)
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2. Wiebing, S.; de Faveri Tron, A.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2024. Distinguished Paper Award
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [pdf]Paper   InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [link]Web   InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [link]Code   InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [link]Video   link   bibtex   340 downloads   Artifact Evaluation Badges:
Practical Data-Only Attack Generation. Johannesmeyer, B.; Slowinska, A.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2024. CSAW Best Paper Award Runner-up
Practical Data-Only Attack Generation [pdf]Paper   Practical Data-Only Attack Generation [pdf]Slides   Practical Data-Only Attack Generation [pdf]Poster   Practical Data-Only Attack Generation [link]Code   Practical Data-Only Attack Generation [link]Video   link   bibtex   124 downloads   Artifact Evaluation Badges:
Data-Only Attacks Are Easier than You Think. Johannesmeyer, B.; Bos, H.; Giuffrida, C.; and Slowinska, A. ;login:. July 2024.
Data-Only Attacks Are Easier than You Think [link]Paper   link   bibtex   28 downloads  
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. Gorter, F.; Kroes, T.; Bos, H.; and Giuffrida, C. In S&P, May 2024.
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags [pdf]Paper   Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags [link]Web   Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags [link]Code   link   bibtex   167 downloads  
  2023 (7)
Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling. Geretto, E.; Hohnerlein, J.; Giuffrida, C.; Bos, H.; Van Der Kouwe, E.; and von Gleissenthall, K. In ACSAC, December 2023.
Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling [pdf]Paper   Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling [link]Code   link   bibtex   38 downloads   Artifact Evaluation Badges:
FloatZone: How Floating Point Additions can Detect Memory Errors. Gorter, F.; Barberis, E.; Isemann, R.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. ;login:. November 2023.
FloatZone: How Floating Point Additions can Detect Memory Errors [link]Paper   link   bibtex   35 downloads  
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. Hertogh, M.; Wiesinger, M.; Österlund, S.; Muench, M.; Amit, N.; Bos, H.; and Giuffrida, C. In RAID, October 2023.
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation [pdf]Paper   Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation [link]Code   link   bibtex   62 downloads  
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. Gorter, F.; Barberis, E.; Isemann, R.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2023.
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit [pdf]Paper   FloatZone: Accelerating Memory Error Detection using the Floating Point Unit [link]Code   FloatZone: Accelerating Memory Error Detection using the Floating Point Unit [link]Web   link   bibtex   412 downloads   Artifact Evaluation Badges:
Uncontained: Uncovering Container Confusion in the Linux Kernel. Koschel, J.; Borrello, P.; D'Elia, D. C.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2023. Distinguished Artifact Award, Pwnie Award Nomination for Best Privilege Escalation
Uncontained: Uncovering Container Confusion in the Linux Kernel [pdf]Paper   Uncontained: Uncovering Container Confusion in the Linux Kernel [link]Web   Uncontained: Uncovering Container Confusion in the Linux Kernel [link]Code   link   bibtex   235 downloads   Artifact Evaluation Badges:
Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations. Isemann, R.; Giuffrida, C.; Bos, H.; Van Der Kouwe, E.; and von Gleissenthall, K. In PLDI, June 2023.
Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations [pdf]Paper   Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations [link]Code   link   bibtex   82 downloads   Artifact Evaluation Badges:
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. Di Dio, A.; Koning, K.; Bos, H.; and Giuffrida, C. In NDSS, February 2023.
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks [pdf]Paper   Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks [link]Code   link   bibtex   101 downloads  
  2022 (9)
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. Geretto, E.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In ACSAC, December 2022.
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots [pdf]Paper   Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots [link]Code   link   bibtex   91 downloads   Artifact Evaluation Badges:
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. Gorter, F.; Koning, K.; Bos, H.; and Giuffrida, C. In CCS, November 2022.
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access [pdf]Paper   DangZero: Efficient Use-After-Free Detection via Direct Page Table Access [link]Code   link   bibtex   164 downloads  
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. Barberis, E.; Frigo, P.; Muench, M.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2022. Pwnie Award Nomination for Epic Achievement, Intel Bounty Reward, Intel Hardware Security Academic Award Honorable Mention, DCSR Paper Award
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [pdf]Paper   Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [link]Web   Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [link]Code   link   bibtex   634 downloads   Artifact Evaluation Badges:
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. Tatar, A.; Trujillo, D.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2022.
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering [pdf]Paper   TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering [link]Code   link   bibtex   117 downloads   Artifact Evaluation Badges:
BugsBunny: Hopping to RTL Targets with a Directed Hardware-Design Fuzzer. Ragab, H.; Koning, K.; Bos, H.; and Giuffrida, C. In SILM, June 2022.
BugsBunny: Hopping to RTL Targets with a Directed Hardware-Design Fuzzer [pdf]Paper   link   bibtex   67 downloads  
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks. Wikner, J.; Giuffrida, C.; Bos, H.; and Razavi, K. In WOOT, May 2022. Mozilla Bounty Reward
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks [pdf]Paper   link   bibtex   163 downloads  
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Johannesmeyer, B.; Koschel, J.; Razavi, K.; Bos, H.; and Giuffrida, C. In NDSS, April 2022. DCSR Paper Award Runner-up
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Paper   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Slides   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Poster   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Web   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Code   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Video   link   bibtex   584 downloads  
On the Effectiveness of Same-Domain Memory Deduplication. Costi, A.; Johannesmeyer, B.; Bosman, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2022.
On the Effectiveness of Same-Domain Memory Deduplication [pdf]Paper   On the Effectiveness of Same-Domain Memory Deduplication [pdf]Slides   On the Effectiveness of Same-Domain Memory Deduplication [link]Web   On the Effectiveness of Same-Domain Memory Deduplication [link]Code   link   bibtex   63 downloads  
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. Bacs, A.; Musaev, S.; Razavi, K.; Giuffrida, C.; and Bos, H. In FAST, February 2022.
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels [pdf]Paper   link   bibtex   141 downloads  
  2021 (7)
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. Mi, X.; Rawat, S.; Giuffrida, C.; and Bos, H. In RAID, October 2021.
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating [pdf]Paper   link   bibtex   42 downloads  
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2021. Distinguished Paper Award, Intel Bounty Reward, Mozilla Bounty Reward, Pwnie Award Nomination for Most Innovative Research, Pwnie Award Nomination for Best Privilege Escalation Bug, Pwnie Award Nomination for Best Client-Side Bug, Pwnie Award Nomination for Epic Achievement, DCSR Paper Award, CSAW Best Paper Award Runner-up
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [pdf]Paper   Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [link]Web   Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [link]Code   link   bibtex   331 downloads  
SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript. de Ridder, F.; Frigo, P.; Vannacci, E.; Bos, H.; Giuffrida, C.; and Razavi, K. In USENIX Security, August 2021. Pwnie Award Nomination for Most Under-Hyped Research, Best Faculty of Science Master Thesis Award
SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [pdf]Paper   SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [link]Web   SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [link]Code   link   bibtex   851 downloads  
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection. Bhat, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In DSN, June 2021.
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection [pdf]Paper   FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection [link]Code   link   bibtex   50 downloads  
CrossTalk: Speculative Data Leaks Across Cores Are Real. Ragab, H.; Milburn, A.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2021. Intel Bounty Reward
CrossTalk: Speculative Data Leaks Across Cores Are Real [pdf]Paper   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Web   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Code   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Press   link   bibtex   561 downloads  
PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination. Duta, V.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In ASPLOS, April 2021.
PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination [pdf]Paper   PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination [link]Code   link   bibtex   12 downloads   Artifact Evaluation Badges:
CollabFuzz: A Framework for Collaborative Fuzzing. Österlund, S.; Geretto, E.; Jemmett, A.; Güler, E.; Görz, P.; Holz, T.; Giuffrida, C.; and Bos, H. In EuroSec, April 2021.
CollabFuzz: A Framework for Collaborative Fuzzing [pdf]Paper   CollabFuzz: A Framework for Collaborative Fuzzing [link]Code   link   bibtex   445 downloads  
  2020 (11)
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. Güler, E.; Görz, P.; Geretto, E.; Jemmett, A.; Österlund, S.; Bos, H.; Giuffrida, C.; and Holz, T. In ACSAC, December 2020.
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing [pdf]Paper   Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing [link]Code   link   bibtex   69 downloads   Artifact Evaluation Badges:
Speculative Probing: Hacking Blind in the Spectre Era. Goktas, E.; Razavi, K.; Portokalidis, G.; Bos, H.; and Giuffrida, C. In CCS, November 2020. Pwnie Award for Most Innovative Research, DCSR Paper Award Runner-up
Speculative Probing: Hacking Blind in the Spectre Era [pdf]Paper   Speculative Probing: Hacking Blind in the Spectre Era [link]Web   Speculative Probing: Hacking Blind in the Spectre Era [link]Code   Speculative Probing: Hacking Blind in the Spectre Era [link]Press   link   bibtex   706 downloads  
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. Konoth, R. K.; Fischer, B.; Fokkink, W.; Athanasopoulos, E.; Razavi, K.; and Bos, H. In EuroS&P, September 2020. Best Paper Award
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions [pdf]Paper   link   bibtex   101 downloads  
TagBleed: Breaking KASLR on the Isolated Kernel Address Space Using Tagged TLBs. Koschel, J.; Giuffrida, C.; Bos, H.; and Razavi, K. In EuroS&P, September 2020.
TagBleed: Breaking KASLR on the Isolated Kernel Address Space Using Tagged TLBs [pdf]Paper   link   bibtex   48 downloads  
ParmeSan: Sanitizer-guided Greybox Fuzzing. Österlund, S.; Razavi, K.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2020.
ParmeSan: Sanitizer-guided Greybox Fuzzing [pdf]Paper   ParmeSan: Sanitizer-guided Greybox Fuzzing [link]Code   link   bibtex   81 downloads  
NetCAT: Practical Cache Attacks from the Network. Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Intel Bounty Reward, Pwnie Award Nomination for Most Innovative Research
NetCAT: Practical Cache Attacks from the Network [pdf]Paper   NetCAT: Practical Cache Attacks from the Network [pdf]Slides   NetCAT: Practical Cache Attacks from the Network [link]Web   NetCAT: Practical Cache Attacks from the Network [link]Press   link   bibtex   399 downloads  
TRRespass: Exploiting the Many Sides of Target Row Refresh. Frigo, P.; Vannacci, E.; Hassan, H.; van der Veen, V.; Mutlu, O.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Best Paper Award, Pwnie Award for Most Innovative Research, IEEE Micro Top Picks Honorable Mention, DCSR Paper Award
TRRespass: Exploiting the Many Sides of Target Row Refresh [pdf]Paper   TRRespass: Exploiting the Many Sides of Target Row Refresh [pdf]Slides   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Web   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Code   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Press   link   bibtex   969 downloads  
Benchmarking Flaws Undermine Security Research. Van Der Kouwe, E.; Heiser, G.; Andriesse, D.; Bos, H.; and Giuffrida, C. IEEE S&P Magazine, 18(3): 48–57. May 2020.
Benchmarking Flaws Undermine Security Research [pdf]Paper   Benchmarking Flaws Undermine Security Research [link]Web   Benchmarking Flaws Undermine Security Research [link]Press   link   bibtex   12 downloads  
PANDAcap: A Framework for Streamlining Collection of Full-System Traces. Stamatogiannakis, M.; Bos, H.; and Groth, P. In EuroSec, April 2020.
PANDAcap: A Framework for Streamlining Collection of Full-System Traces [pdf]Paper   PANDAcap: A Framework for Streamlining Collection of Full-System Traces [pdf]Slides   PANDAcap: A Framework for Streamlining Collection of Full-System Traces [link]Code   link   bibtex   42 downloads  
BinRec: Dynamic Binary Lifting and Recompilation. Altinay, A.; Nash, J.; Kroes, T.; Rajasekaran, P.; Zhou, D.; Dabrowski, A.; Gens, D.; Na, Y.; Volckaert, S.; Giuffrida, C.; Bos, H.; and Franz, M. In EuroSys, April 2020.
BinRec: Dynamic Binary Lifting and Recompilation [pdf]Paper   BinRec: Dynamic Binary Lifting and Recompilation [link]Code   link   bibtex   90 downloads  
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Gras, B.; Giuffrida, C.; Kurth, M.; Bos, H.; and Razavi, K. In NDSS, February 2020.
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures [pdf]Paper   link   bibtex   70 downloads  
  2019 (6)
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. Pawlowski, A.; van der Veen, V.; Andriesse, D.; van der Kouwe, E.; Holz, T.; Giuffrida, C.; and Bos, H. In ACSAC, December 2019.
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching [pdf]Paper   link   bibtex   11 downloads  
SoK: Benchmarking Flaws in Systems Security. van der Kouwe, E.; Heiser, G.; Andriesse, D.; Bos, H.; and Giuffrida, C. In EuroS&P, June 2019.
SoK: Benchmarking Flaws in Systems Security [pdf]Paper   SoK: Benchmarking Flaws in Systems Security [pdf]Slides   SoK: Benchmarking Flaws in Systems Security [link]Web   SoK: Benchmarking Flaws in Systems Security [link]Press   link   bibtex   162 downloads  
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. Cojocar, L.; Razavi, K.; Giuffrida, C.; and Bos, H. In S&P, May 2019. Best Practical Paper Award, Pwnie Award Nomination for Most Innovative Research, DCSR Paper Award Runner-up
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Paper   Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Slides   Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [link]Web   Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [link]Press   link   bibtex   405 downloads  
RIDL: Rogue In-flight Data Load. van Schaik, S.; Milburn, A.; Österlund, S.; Frigo, P.; Maisuradze, G.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2019. Intel Bounty Reward (Highest To Date), Pwnie Award Nomination for Most Innovative Research, CSAW Best Paper Award Runner-up, DCSR Paper Award
RIDL: Rogue In-flight Data Load [pdf]Paper   RIDL: Rogue In-flight Data Load [link]Slides   RIDL: Rogue In-flight Data Load [link]Web   RIDL: Rogue In-flight Data Load [link]Code   RIDL: Rogue In-flight Data Load [link]Press   link   bibtex   117 downloads  
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations. Bhat, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [pdf]Paper   ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [link]Web   ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [link]Code   link   bibtex   33 downloads  
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution. Österlund, S.; Koning, K.; Olivier, P.; Barbalace, A.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [pdf]Paper   kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [link]Web   kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [link]Code   link   bibtex   73 downloads  
  2018 (17)
Now You See Me: Real-time Dynamic Function Call Detection. de Goër, F.; Rawat, S.; Andriesse, D.; Bos, H.; and Groz, R. In ACSAC, December 2018.
Now You See Me: Real-time Dynamic Function Call Detection [pdf]Paper   Now You See Me: Real-time Dynamic Function Call Detection [link]Code   link   bibtex   5 downloads  
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. van der Kouwe, E.; Kroes, T.; Ouwehand, C.; Bos, H.; and Giuffrida, C. In ACSAC, December 2018.
Type-After-Type: Practical and Complete Type-Safe Memory Reuse [pdf]Paper   Type-After-Type: Practical and Complete Type-Safe Memory Reuse [link]Code   link   bibtex   22 downloads  
TIFF: Using Input Type Inference To Improve Fuzzing. Jain, V.; Rawat, S.; Giuffrida, C.; and Bos, H. In ACSAC, December 2018.
TIFF: Using Input Type Inference To Improve Fuzzing [pdf]Paper   TIFF: Using Input Type Inference To Improve Fuzzing [link]Code   link   bibtex   9 downloads  
On the Effectiveness of Code Normalization for Function Identification. Oikonomopoulos, A.; Vermeulen, R.; Giuffrida, C.; and Bos, H. In PRDC, December 2018.
On the Effectiveness of Code Normalization for Function Identification [pdf]Paper   On the Effectiveness of Code Normalization for Function Identification [link]Code   link   bibtex   10 downloads  
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. Konoth, R. K.; Oliverio, M.; Tatar, A.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Razavi, K. In OSDI, October 2018.
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [pdf]Paper   ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [link]Code   link   bibtex   45 downloads  
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Konoth, R. K.; Vineti, E.; Moonsamy, V.; Lindorfer, M.; Kruegel, C.; Bos, H.; and Vigna, G. In CCS, October 2018.
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense [pdf]Paper   MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense [link]Code   link   bibtex   11 downloads  
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery. Kroes, T.; Altinay, A.; Nash, J.; Na, Y.; Volckaert, S.; Bos, H.; Franz, M.; and Giuffrida, C. In FEAST, October 2018.
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery [pdf]Paper   BinRec: Attack Surface Reduction Through Dynamic Binary Recovery [pdf]Slides   link   bibtex   14 downloads  
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer. Tatar, A.; Giuffrida, C.; Bos, H.; and Razavi, K. In RAID, September 2018. Best Paper Award
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [pdf]Paper   Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [link]Code   link   bibtex   47 downloads  
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. Gras, B.; Razavi, K.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2018. Pwnie Award Nomination for Most Innovative Research, DCSR Paper Award Runner-up
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [pdf]Paper   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [pdf]Slides   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [link]Web   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [link]Code   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [link]Press   link   bibtex   511 downloads  
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. van Schaik, S.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX Security, August 2018.
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [pdf]Paper   Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [link]Web   Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [link]Code   link   bibtex   96 downloads  
TLBleed: When Protecting Your CPU Caches is not Enough. Gras, B.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, August 2018.
TLBleed: When Protecting Your CPU Caches is not Enough [pdf]Slides   TLBleed: When Protecting Your CPU Caches is not Enough [link]Web   link   bibtex   149 downloads  
Throwhammer: Rowhammer Attacks over the Network and Defenses. Tatar, A.; Konoth, R. K.; Athanasopoulos, E.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX ATC, July 2018. Pwnie Award Nomination for Most Innovative Research
Throwhammer: Rowhammer Attacks over the Network and Defenses [pdf]Paper   Throwhammer: Rowhammer Attacks over the Network and Defenses [link]Web   Throwhammer: Rowhammer Attacks over the Network and Defenses [link]Code   Throwhammer: Rowhammer Attacks over the Network and Defenses [link]Press   link   bibtex   333 downloads  
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. van der Veen, V.; Lindorfer, M.; Fratantonio, Y.; Padmanabha Pillai, H.; Vigna, G.; Kruegel, C.; Bos, H.; and Razavi, K. In DIMVA, June 2018. Pwnie Award Nomination for Best Privilege Escalation Bug
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [pdf]Paper   GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [link]Web   GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [link]Code   GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [link]Press   link   bibtex   95 downloads  
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2018. Pwnie Award Nomination for Most Innovative Research, DCSR Paper Award Runner-up
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [pdf]Paper   Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [link]Web   Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [link]Press   link   bibtex   169 downloads  
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Göktaş, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2018.
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [pdf]Paper   Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [link]Web   Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [link]Code   link   bibtex   70 downloads  
Towards Automated Vulnerability Scanning of Network Servers. Schagen, N.; Koen, K.; Bos, H.; and Giuffrida, C. In EuroSec, April 2018.
Towards Automated Vulnerability Scanning of Network Servers [pdf]Paper   link   bibtex   14 downloads  
Delta Pointers: Buffer Overflow Checks Without the Checks. Kroes, T.; Koning, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In EuroSys, April 2018.
Delta Pointers: Buffer Overflow Checks Without the Checks [pdf]Paper   Delta Pointers: Buffer Overflow Checks Without the Checks [pdf]Slides   Delta Pointers: Buffer Overflow Checks Without the Checks [link]Code   link   bibtex   55 downloads  
  2017 (16)
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. van der Veen, V.; Andriesse, D.; Stamatogiannakis, M.; Chen, X.; Bos, H.; and Giuffrida, C. In CCS, October 2017. DCSR Paper Award Runner-up
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [pdf]Paper   The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [link]Web   link   bibtex   73 downloads  
DSIbin: Identifying Dynamic Data Structures in C/C++ Binaries. Ruprecht, T.; Chen, X.; White, D.; Bockmann, J.; Luettgen, G.; and Bos, H. In ASE, October 2017.
DSIbin: Identifying Dynamic Data Structures in C/C++ Binaries [pdf]Paper   link   bibtex   6 downloads  
Secure Page Fusion with VUsion. Oliverio, M.; Razavi, K.; Bos, H.; and Giuffrida, C. In SOSP, October 2017.
Secure Page Fusion with VUsion [pdf]Paper   Secure Page Fusion with VUsion [link]Slides   Secure Page Fusion with VUsion [pdf]Poster   Secure Page Fusion with VUsion [link]Web   Secure Page Fusion with VUsion [link]Code   link   bibtex   85 downloads  
PROV2R: Practical Provenance Analysis of Unstructured Processes. Stamatogiannakis, M.; Athanasopoulos, E.; Bos, H.; and Groth, P. ACM Trans. Internet Technol., 17(4). August 2017.
PROV2R: Practical Provenance Analysis of Unstructured Processes [link]Paper   PROV2R: Practical Provenance Analysis of Unstructured Processes [link]Code   link   bibtex   2 downloads  
JTR: A Binary Solution for Switch-Case Recovery. Cojocar, L.; Kroes, T.; and Bos, H. In ESSoS, July 2017.
JTR: A Binary Solution for Switch-Case Recovery [link]Paper   link   bibtex   7 downloads  
Towards Automated Discovery of Crash-Resistant Primitives in Binaries. Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T. In DSN, June 2017.
Towards Automated Discovery of Crash-Resistant Primitives in Binaries [pdf]Paper   Towards Automated Discovery of Crash-Resistant Primitives in Binaries [link]Web   link   bibtex   7 downloads  
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Chen, X.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2017.
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks [pdf]Paper   link   bibtex   8 downloads  
Off-the-shelf Embedded Devices As Platforms for Security Research. Cojocar, L.; Razavi, K.; and Bos, H. In EuroSec, April 2017.
Off-the-shelf Embedded Devices As Platforms for Security Research [link]Paper   link   bibtex   19 downloads  
Compiler-Agnostic Function Detection in Binaries. Andriesse, D.; Slowinska, A.; and Bos, H. In EuroS&P, April 2017. Best Paper Award
Compiler-Agnostic Function Detection in Binaries [pdf]Paper   Compiler-Agnostic Function Detection in Binaries [link]Code   link   bibtex   25 downloads  
Fast and Generic Metadata Management with Mid-Fat Pointers. Kroes, T.; Koning, K.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In EuroSec, April 2017.
Fast and Generic Metadata Management with Mid-Fat Pointers [pdf]Paper   Fast and Generic Metadata Management with Mid-Fat Pointers [link]Code   link   bibtex   10 downloads  
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. In EuroSec, April 2017.
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [pdf]Paper   RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [link]Code   link   bibtex   170 downloads  
No Need to Hide: Protecting Safe Regions on Commodity Hardware. Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E. In EuroSys, April 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware [pdf]Paper   No Need to Hide: Protecting Safe Regions on Commodity Hardware [link]Web   No Need to Hide: Protecting Safe Regions on Commodity Hardware [link]Code   link   bibtex   17 downloads  
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C. In NDSS, February 2017. Pwnie Award for Most Innovative Research, DCSR Paper Award
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Slides   ASLR on the Line: Practical Cache Attacks on the MMU [link]Web   ASLR on the Line: Practical Cache Attacks on the MMU [link]Code   ASLR on the Line: Practical Cache Attacks on the MMU [link]Press   link   bibtex   302 downloads  
VUzzer: Application-aware Evolutionary Fuzzing. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H. In NDSS, February 2017.
VUzzer: Application-aware Evolutionary Fuzzing [pdf]Paper   VUzzer: Application-aware Evolutionary Fuzzing [link]Code   link   bibtex   13 downloads  
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Milburn, A.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [pdf]Paper   SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [link]Code   link   bibtex   6 downloads  
MARX: Uncovering Class Hierarchies in C++ Programs. Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C. In NDSS, February 2017.
MARX: Uncovering Class Hierarchies in C++ Programs [pdf]Paper   MARX: Uncovering Class Hierarchies in C++ Programs [link]Code   link   bibtex   4 downloads  
  2016 (21)
A NEaT Design for Reliable and Scalable Network Stacks. Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S. In CoNext, December 2016.
A NEaT Design for Reliable and Scalable Network Stacks [pdf]Paper   link   bibtex   6 downloads  
Bypassing Clang's SafeStack for Fun and Profit. Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Bypassing Clang's SafeStack for Fun and Profit [pdf]Slides   Bypassing Clang's SafeStack for Fun and Profit [link]Web   link   bibtex   6 downloads  
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Slides   Flip Feng Shui: Rowhammering the VM's Isolation [link]Web   link   bibtex   71 downloads  
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C. In CCS, October 2016. Pwnie Award for Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSR Paper Award
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [link]Web   Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [link]Code   Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [link]Press   link   bibtex   245 downloads  
TypeSan: Practical Type Confusion Detection. Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In CCS, October 2016.
TypeSan: Practical Type Confusion Detection [pdf]Paper   TypeSan: Practical Type Confusion Detection [link]Code   link   bibtex   14 downloads  
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging. Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C. In ISSRE, October 2016.
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [pdf]Paper   Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [link]Code   link   bibtex   7 downloads  
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming. Veggalam, S.; Rawat, S.; Haller, I.; and Bos, H. In ESORICS, September 2016.
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming [pdf]Paper   IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming [link]Code   link   bibtex   5 downloads  
Undermining Information Hiding (And What to do About it). Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016.
Undermining Information Hiding (And What to do About it) [pdf]Paper   Undermining Information Hiding (And What to do About it) [link]Web   link   bibtex   9 downloads  
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. Andriesse, D.; Chen, X.; van der Veen, V.; Slowinska, A.; and Bos, H. In USENIX Security, August 2016.
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries [pdf]Paper   An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries [link]Web   link   bibtex   7 downloads  
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016. Pwnie Award Nomination for Best Cryptographic Attack
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Slides   Flip Feng Shui: Hammering a Needle in the Software Stack [link]Web   Flip Feng Shui: Hammering a Needle in the Software Stack [link]Press   link   bibtex   128 downloads  
Poking Holes in Information Hiding. Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2016.
Poking Holes in Information Hiding [pdf]Paper   Poking Holes in Information Hiding [pdf]Slides   Poking Holes in Information Hiding [link]Web   Poking Holes in Information Hiding [link]Code   link   bibtex   13 downloads  
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, July 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Slides   Over the Edge: Silently Owning Windows 10's Secure Browser [link]Web   link   bibtex   50 downloads  
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. Koning, K.; Bos, H.; and Giuffrida, C. In DSN, June 2016.
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [pdf]Paper   Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [link]Code   link   bibtex   17 downloads  
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In DSN, June 2016. Best Paper Session
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [pdf]Paper   OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [link]Code   link   bibtex   10 downloads  
Trade-offs in Automatic Provenance Capture. Stamatogiannakis, M.; Kazmi, H.; Sharif, H.; Vermeulen, R.; Gehani, A.; Bos, H.; and Groth, P. In IPAW, June 2016.
Trade-offs in Automatic Provenance Capture [link]Paper   link   bibtex  
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2016. Pwnie Award for Most Innovative Research
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [link]Web   Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [link]Press   link   bibtex   110 downloads  
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C. In S&P, May 2016.
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [pdf]Paper   A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [link]Code   link   bibtex   8 downloads  
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening. Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2016.
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening [pdf]Paper   link   bibtex   4 downloads  
Slick: An Intrusion Detection System for Virtualized Storage Devices. Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H. In SAC, April 2016.
Slick: An Intrusion Detection System for Virtualized Storage Devices [pdf]Paper   link   bibtex   4 downloads  
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Konoth, R. K.; van der Veen, V.; and Bos, H. In FC, February 2016.
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [pdf]Paper   How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [link]Web   How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [link]Press   link   bibtex   35 downloads  
Binary Rejuvenation: Applications and Challenges. Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H. IEEE S&P Magazine, 14(1). January 2016.
Binary Rejuvenation: Applications and Challenges [pdf]Paper   link   bibtex   1 download  
  2015 (11)
Practical Context-Sensitive CFI. van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C. In CCS, November 2015.
Practical Context-Sensitive CFI [pdf]Paper   Practical Context-Sensitive CFI [link]Web   Practical Context-Sensitive CFI [link]Code   link   bibtex   116 downloads  
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C. In NDSS, November 2015.
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries [pdf]Paper   link   bibtex   7 downloads  
Speculative Memory Checkpointing. Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In Middleware, October 2015.
Speculative Memory Checkpointing [pdf]Paper   link   bibtex   2 downloads  
Lightweight Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2015.
Lightweight Memory Checkpointing [pdf]Paper   link   bibtex   5 downloads  
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. Andriesse, D.; Bos, H.; and Slowinska, A. In DSN, October 2015.
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming [pdf]Paper   link   bibtex   2 downloads  
ShrinkWrap: VTable Protection Without Loose Ends. Haller, I.; Goktas, E.; Athanasopoulos, E.; Portokalidis, G.; and Bos, H. In ACSAC, October 2015. Outstanding Student Paper Award
ShrinkWrap: VTable Protection Without Loose Ends [pdf]Paper   link   bibtex   5 downloads  
Reliable Recon in Adversarial Peer-to-Peer Botnets. Andriesse, D.; Rossow, C.; and Bos, H. In IMC, October 2015.
Reliable Recon in Adversarial Peer-to-Peer Botnets [pdf]Paper   link   bibtex  
PIE: Parser Identification in Embedded Systems. Cojocar, L.; Zaddach, J.; Verdult, R.; Bos, H.; Balzarotti, D.; and Francillon, A. In ACSAC, October 2015.
PIE: Parser Identification in Embedded Systems [pdf]Paper   link   bibtex   3 downloads  
Decoupling Provenance Capture and Analysis from Execution. Stamatogiannakis, M.; Groth, P.; and Bos, H. In TaPP, October 2015.
Decoupling Provenance Capture and Analysis from Execution [link]Paper   link   bibtex   2 downloads  
The BORG: Nanoprobing Binaries for Buffer Overreads. Neugschwandtner, M.; Milani Comparetti, P.; Haller, I.; and Bos, H. In CODASPY, September 2015.
The BORG: Nanoprobing Binaries for Buffer Overreads [pdf]Paper   link   bibtex  
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them. Grill, B.; Bacs, A.; Platzer, C.; and Bos, H. In DIMVA, September 2015.
Nice Boots - A Large-Scale Analysis of Bootkits and New Ways to Stop Them [pdf]Paper   link   bibtex   13 downloads  
  2014 (10)
Framing signals - Return to portable exploits. Bosman, E.; and Bos, H. In S&P, December 2014. Best Student Paper Award
Framing signals - Return to portable exploits [pdf]Paper   link   bibtex   14 downloads  
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. Goktas, E.; Athanasopoulos, E.; Polychronakis, M.; Bos, H.; and Portokalidis, G. In USENIX Security, December 2014.
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard [pdf]Paper   link   bibtex   8 downloads  
Out Of Control: Overcoming Control-Flow Integrity. Goktas, E.; Athanasopoulos, E.; Bos, H.; and Portokalidis, G. In S&P, December 2014. DCSR Paper Award
Out Of Control: Overcoming Control-Flow Integrity [pdf]Paper   link   bibtex   4 downloads  
On Sockets and System Calls: Minimizing Context Switches for the Socket API. Hruby, T.; Crivat, T.; Bos, H.; and Tanenbaum, A. S. In TRIOS, October 2014.
On Sockets and System Calls: Minimizing Context Switches for the Socket API [pdf]Paper   link   bibtex   3 downloads  
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Giuffrida, C.; Majdanik, K.; Conti, M.; and Bos, H. In DIMVA, September 2014.
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [pdf]Paper   I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [link]Code   link   bibtex   3 downloads  
Instruction-Level Steganography for Covert Trigger-Based Malware. Andriesse, D.; and Bos, H. In DIMVA, September 2014.
Instruction-Level Steganography for Covert Trigger-Based Malware [pdf]Paper   link   bibtex  
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables). Slowinska, A.; Haller, I.; Bacs, A.; Baranga, S.; and Bos, H. In DIMVA, September 2014.
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables) [pdf]Paper   link   bibtex  
Towards Optimal Scheduling of Multiserver System Components. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In MOS, September 2014.
Towards Optimal Scheduling of Multiserver System Components [pdf]Paper   link   bibtex  
On measuring the impact of DDoS botnets. Welzel, A.; Rossow, C.; and Bos, H. In EuroSec, September 2014.
On measuring the impact of DDoS botnets [pdf]Paper   link   bibtex   1 download  
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation. Stamatogiannakis, M.; Groth, P.; and Bos, H. In IPAW, September 2014.
Looking Inside the Black-Box: Capturing Data Provenance using Dynamic Instrumentation [pdf]Paper   link   bibtex   3 downloads  
  2013 (7)
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Rossow, C.; Andriesse, D.; Werner, T.; Stone-Gross, B.; Dietrich, C. J.; and Bos, H. In S&P, December 2013.
P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets [pdf]Paper   link   bibtex  
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Haller, I.; Slowinska, A.; Neugschwandtner, M.; and Bos, H. In USENIX Security, December 2013.
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations [pdf]Paper   link   bibtex   4 downloads  
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems. Hruby, T.; Bos, H.; and Tanenbaum, A. S. In USENIX ATC, November 2013.
When Slower is Faster: On Heterogeneous Multicores for Reliable Systems [pdf]Paper   link   bibtex   1 download  
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   link   bibtex   1 download  
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus. Andriesse, D.; Rossow, C.; Stone-Gross, B.; Plohmann, D.; and Bos, H. In MALWARE, September 2013.
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus [pdf]Paper   link   bibtex   2 downloads  
MemPick: Data Structure Detection in C/C++ Binaries. Haller, I.; Slowinska, A.; and Bos, H. In WCRE, September 2013.
MemPick: Data Structure Detection in C/C++ Binaries [pdf]Paper   link   bibtex   2 downloads  
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries. Chen, X.; Slowinska, A.; and Bos, H. In WCRE, September 2013. Best Paper Award
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries [pdf]Paper   link   bibtex  
  2012 (5)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. Rossow, C.; Dietrich, C. J.; Grier, C.; Kreibich†, C.; Paxson†, V.; Pohlmann, N.; Bos, H.; and Steen, M. v. In S&P, December 2012.
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook [pdf]Paper   link   bibtex   2 downloads  
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. Slowinska, A.; Stancescu, T.; and Bos, H. In USENIX ATC, November 2012.
Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation [pdf]Paper   link   bibtex   12 downloads  
Memory Errors: The Past, the Present, and the Future. van der Veen, V.; Dutt-Sharma, N.; Cavallaro, L.; and Bos, H. In RAID, October 2012.
Memory Errors: The Past, the Present, and the Future [pdf]Paper   link   bibtex   4 downloads  
Keep Net Working - On a Dependable and Fast Networking Stack. Hruby, T.; Vogt, D.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2012.
Keep Net Working - On a Dependable and Fast Networking Stack [pdf]Paper   link   bibtex   4 downloads  
System-level Support for Intrusion Recovery. Bacs, A.; Vermeulen, R.; Slowinska, A.; and Bos, H. In DIMVA, September 2012.
System-level Support for Intrusion Recovery [pdf]Paper   link   bibtex   6 downloads  
  2011 (4)
Application-Tailored I/O with Streamline. de Bruijn, W.; Bos, H.; and Bal, H. TOCS, 29(2): 6:1–6:33. December 2011.
Application-Tailored I/O with Streamline [pdf]Paper   Application-Tailored I/O with Streamline [link]Web   link   bibtex   2 downloads  
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Slowinska, A.; Stancescu, T.; and Bos, H. In NDSS, November 2011.
Howard: A Dynamic Excavator for Reverse Engineering Data Structures [pdf]Paper   link   bibtex   12 downloads  
Minemu: The World's Fastest Taint Tracker. Bosman, E.; Slowinska, A.; and Bos, H. In RAID, October 2011.
Minemu: The World's Fastest Taint Tracker [pdf]Paper   Minemu: The World's Fastest Taint Tracker [link]Web   link   bibtex   19 downloads  
On Botnets that Use DNS for Command and Control. Dietrich, C. J.; Rossow, C.; Freiling, F. C.; Bos, H.; Steen, M. v.; and Pohlmann, N. In EC2ND, September 2011.
On Botnets that Use DNS for Command and Control [pdf]Paper   link   bibtex  
  2010 (4)
Paranoid Android: Versatile Protection For Smartphones. Portokalidis, G.; Homburg, P.; Anagnostakis, K.; and Bos, H. In ACSAC, October 2010.
Paranoid Android: Versatile Protection For Smartphones [pdf]Paper   link   bibtex   1 download  
DDE: Dynamic Data Structure Excavation. Slowinska, A.; Stancescu, T.; and Bos, H. In APSYS, September 2010.
DDE: Dynamic Data Structure Excavation [pdf]Paper   link   bibtex  
Pointer Tainting Still Pointless: (But We All See the Point of Tainting). Slowinska, A.; and Bos, H. OSR, 44(3): 88–92. September 2010.
Pointer Tainting Still Pointless: (But We All See the Point of Tainting) [pdf]Paper   link   bibtex   1 download  
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). June 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   MINIX 3: Status Report and Current Research [link]Web   MINIX 3: Status Report and Current Research [link]Code   link   bibtex   2 downloads  
  2009 (4)
Pointless Tainting? Evaluating the Practicality of Pointer Tainting. Slowinska, A.; and Bos, H. In EuroSys, December 2009.
Pointless Tainting? Evaluating the Practicality of Pointer Tainting [pdf]Paper   link   bibtex  
Fault Isolation for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2009.
Fault Isolation for Device Drivers [pdf]Paper   Fault Isolation for Device Drivers [link]Web   Fault Isolation for Device Drivers [link]Code   link   bibtex  
Mapping and Synchronizing Streaming Applications on Cell Processors. Nijhuis, M.; Bos, H.; Bal, H.; and Augonnet, C. In HiPEAC, September 2009.
Mapping and Synchronizing Streaming Applications on Cell Processors [pdf]Paper   link   bibtex  
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC. Bos, H.; and Huang, K. In ANCS, September 2009.
CacheCard: A Transparent Cache for Static and Dynamic Content on the NIC [pdf]Paper   link   bibtex  
  2008 (7)
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits. Portokalidis, G.; and Bos, H. In EuroSys, December 2008.
Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits [pdf]Paper   link   bibtex   2 downloads  
Beltway Buffers: Avoiding the OS Traffic Jam. Bruijn, W. d.; and Bos, H. In INFOCOM, November 2008.
Beltway Buffers: Avoiding the OS Traffic Jam [pdf]Paper   link   bibtex  
PipesFS: Fast Linux I/O in the Unix Tradition. Bruijn, W. d.; and Bos, H. OSR. September 2008.
PipesFS: Fast Linux I/O in the Unix Tradition [pdf]Paper   link   bibtex   1 download  
Countering IPC Threats in Multiserver Operating Systems. Herder, J.; Bos, H.; Homburg, P.; Gras, B.; and Tanenbaum, A. S. In PRDC, September 2008.
Countering IPC Threats in Multiserver Operating Systems [pdf]Paper   link   bibtex  
Future Threats to Future Trust. Bos, H.; Ioannidis, S.; Jonsson, E.; Kirda, E.; and Kruegel, C. In FTC, September 2008.
Future Threats to Future Trust [pdf]Paper   link   bibtex  
Safe Execution of Untrusted Applications on Embedded Network Processors. Bos, H.; Samwel, B.; Cristea, M.; and Anagnostakis, K. IJES, 4(3). September 2008.
Safe Execution of Untrusted Applications on Embedded Network Processors [pdf]Paper   link   bibtex   1 download  
Model-T: Rethinking the OS for Terabit Speeds. Bruijn, W. d.; and Bos, H. In HSN, September 2008.
Model-T: Rethinking the OS for Terabit Speeds [pdf]Paper   link   bibtex  
  2007 (8)
Failure Resilience for Device Drivers. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. In DSN, October 2007. William C. Carter Award
Failure Resilience for Device Drivers [pdf]Paper   link   bibtex   2 downloads  
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Slowinska, A.; and Bos, H. In ACSAC, October 2007.
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack [pdf]Paper   link   bibtex   1 download  
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots. Portokalidis, G.; and Bos, H. Computer Networks, 51(5). September 2007.
SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots [pdf]Paper   link   bibtex   1 download  
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications. Nijhuis, M.; Bos, H.; and Bal, H. In ICPP, September 2007.
A Component-Based Coordination Language for Efficient Reconfigurable Streaming Applications [pdf]Paper   link   bibtex  
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. Cristea, M.; Gommans, L.; Xu, L.; and Bos, H. In Networking, September 2007.
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [pdf]Paper   link   bibtex  
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting. Valkering, M.; Slowinska, A.; and Bos, H. In EC2ND, September 2007.
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting [pdf]Paper   link   bibtex   1 download  
Ruler: Easy Packet Matching and Rewriting on Network Processors. Hruby, T.; Reeuwijk, K. v.; and Bos, H. In ANCS, September 2007.
Ruler: Easy Packet Matching and Rewriting on Network Processors [pdf]Paper   link   bibtex   2 downloads  
Roadmap to a Failure-Resilient Operating System. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 32(1). August 2007.
Roadmap to a Failure-Resilient Operating System [pdf]Paper   link   bibtex  
  2006 (11)
Argos: an Emulator for Fingerprinting Zero-Day Attacks. Portokalidis, G.; Slowinska, A.; and Bos, H. In EuroSys, December 2006.
Argos: an Emulator for Fingerprinting Zero-Day Attacks [pdf]Paper   Argos: an Emulator for Fingerprinting Zero-Day Attacks [link]Web   link   bibtex   8 downloads  
Supporting Reconfigurable Parallel Multimedia Applications. Nijhuis, M.; Bos, H.; and Bal, H. E. In EuroPar, October 2006. Distinguished Paper Award
Supporting Reconfigurable Parallel Multimedia Applications [pdf]Paper   link   bibtex  
Can We Make Operating Systems Reliable and Secure?. Andrew S. Tanenbaum, J. N. H.; and Bos, H. IEEE Computer, 39(4). October 2006.
Can We Make Operating Systems Reliable and Secure? [pdf]Paper   link   bibtex  
SafeCard: A Gigabit IPS on the Network Card. Bruijn, W. d.; Slowinska, A.; Reeuwijk, K. v.; Hruby, T.; Xu, L.; and Bos, H. In RAID, October 2006.
SafeCard: A Gigabit IPS on the Network Card [pdf]Paper   link   bibtex  
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications. Varbanescu, A. L.; Nijhuis, M.; Gonzalez, A.; Escribano; Sips, H.; Bos, H.; and Ba, H. In LCPC, September 2006.
SP@CE - An SP-based Programming Model for Consumer Electronics Streaming Applications [pdf]Paper   link   bibtex  
Reorganizing UNIX for Reliability. Herder, J.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. In ACSAC, September 2006.
Reorganizing UNIX for Reliability [link]Paper   link   bibtex  
Minix 3: A Highly Reliable, Self-Repairing Operating System. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. OSR, 40(3). September 2006.
Minix 3: A Highly Reliable, Self-Repairing Operating System [pdf]Paper   Minix 3: A Highly Reliable, Self-Repairing Operating System [link]Web   Minix 3: A Highly Reliable, Self-Repairing Operating System [link]Code   link   bibtex   1 download  
Construction of a Highly Dependable Operating System. Jorrit N. Herder, H. B.; and Tanenbaum, A. S. In EDCC, September 2006.
Construction of a Highly Dependable Operating System [pdf]Paper   link   bibtex   1 download  
File Size Distribution on UNIX Systems - Then and Now. Tanenbaum, A. S.; Herder, J.; and Bos, H. OSR, 40(1). September 2006.
File Size Distribution on UNIX Systems - Then and Now [pdf]Paper   link   bibtex  
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing. Bos, H.; Samwel, B.; and Booij, I. Computer Networks, 50(14). September 2006.
Dynamically Extending the Corral with Native Code for High-Speed Packet Processing [pdf]Paper   link   bibtex  
Modular System Programming in Minix 3. Herder, J. N.; Bos, H.; Gras, B.; Homburg, P.; and Tanenbaum, A. S. ;login, 31(2). August 2006.
Modular System Programming in Minix 3 [pdf]Paper   Modular System Programming in Minix 3 [link]Web   Modular System Programming in Minix 3 [link]Code   link   bibtex  
  2005 (4)
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Bos, H.; and Huang, K. In RAID, October 2005.
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card [pdf]Paper   link   bibtex   1 download  
FPL-3E: Towards Language Support for Reconfigurable Packet Processing. Cristea, M. L.; Zissulescu, C.; Deprettere, E.; and Bos, H. In SAMOS, September 2005.
FPL-3E: Towards Language Support for Reconfigurable Packet Processing [link]Paper   link   bibtex  
Robust Distributed Systems - Achieving Self-Management Through Inference. Bruijn, W. d.; Bos, H.; and Bal, H. In ACC, September 2005.
Robust Distributed Systems - Achieving Self-Management Through Inference [pdf]Paper   link   bibtex   1 download  
FPL-3: Towards Language Support for Distributed Packet Processing. Cristea, M.; Bruijn, W. d.; and Bos, H. In Networking, September 2005.
FPL-3: Towards Language Support for Distributed Packet Processing [pdf]Paper   link   bibtex  
  2004 (4)
FFPF: Fairly Fast Packet Filters. Bos, H.; Bruijn, W. d.; Cristea, M.; Nguyen, T.; and Portokalidis, G. In OSDI, December 2004.
FFPF: Fairly Fast Packet Filters [pdf]Paper   FFPF: Fairly Fast Packet Filters [link]Web   link   bibtex   2 downloads  
On the Feasibility of Using Network Processors for DNA Queries. Bos, H.; and Huang, K. In NP, September 2004.
On the Feasibility of Using Network Processors for DNA Queries [pdf]Paper   link   bibtex  
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach. Nguyen, T.; Bruijn, W. d.; Cristea, M.; and Bos, H. In IPOM, September 2004.
Scalable Network Monitors for High-Speed Links:a Bottom-Up Approach [pdf]Paper   link   bibtex  
SNMP Plus a Lightweight API for SNAP Handling (SPLASH). Bruijn, W. d.; Bos, H.; and Moore, J. In NOMS, September 2004.
SNMP Plus a Lightweight API for SNAP Handling (SPLASH) [pdf]Paper   link   bibtex  
  2003 (2)
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks. Coppens, J.; Berghe, S. V. d.; Bos, H.; Markatos, E.; Turck, F. D.; Oslebo, A.; and Ubik, S. In E2EMON, September 2003.
SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks [pdf]Paper   link   bibtex   1 download  
HOKES/POKES: Lightweight Resource Sharing. Bos, H.; and Samwel, B. In EmSoft, September 2003.
HOKES/POKES: Lightweight Resource Sharing [pdf]Paper   link   bibtex  
  2002 (4)
A perspective on how ATM lost Control. Crosby, S.; Rooney, S.; Isaacs, I.; and Bos, H. ACM SIGCOMM Computer Communication Review, 32(5). November 2002.
A perspective on how ATM lost Control [pdf]Paper   link   bibtex  
The OKE Corral: Code Organisation and Reconfiguration at Runtime using Active Linking. Bos, H.; and Samwel, B. In IWAN, September 2002.
The OKE Corral: Code Organisation and Reconfiguration at Runtime using Active Linking [pdf]Paper   link   bibtex   2 downloads  
Safe Kernel Programming in the OKE. Bos, H.; and Samwel, B. In OPENARCH, September 2002.
Safe Kernel Programming in the OKE [pdf]Paper   link   bibtex  
Towards Flexible Real-Time Network Monitoring Using a Network Processor. Anagnostakis, K.; and Bos, H. In SANE, May 2002.
Towards Flexible Real-Time Network Monitoring Using a Network Processor. [link]Paper   link   bibtex  
  2001 (2)
Elastic Network Control: An Alternative to Active Networks. Bos, H.; Isaacs, R.; Mortier, M.; and Leslie, I. JCN, 3(2). January 2001.
Elastic Network Control: An Alternative to Active Networks [pdf]Paper   link   bibtex   1 download  
Efficient Reservations in Open ATM Network Control Using Online Measurements. Bos, H. JCS. January 2001.
Efficient Reservations in Open ATM Network Control Using Online Measurements [pdf]Paper   link   bibtex  
  2000 (1)
Open Extensible Network Control. Bos, H. JNSM, 8(1). January 2000.
Open Extensible Network Control [link]Paper   link   bibtex  
  1999 (2)
Application-Specific Policies: Beyond the Domain Boundaries. Bos, H. In IM, May 1999.
link   bibtex  
Application-specific Behaviour in Distributed Network Control. Bos, H. In ERSADS, January 1999.
Application-specific Behaviour in Distributed Network Control [pdf]Paper   link   bibtex  
  1998 (2)
ATM Admission Control based on Reservations and Measurements. Bos, H. In IPCCC, February 1998.
ATM Admission Control based on Reservations and Measurements [pdf]Paper   link   bibtex   4 downloads  
Building a Distributed Video Server using Advanced ATM Network Support. Bos, H. In MMNS, January 1998.
Building a Distributed Video Server using Advanced ATM Network Support [pdf]Paper   link   bibtex   4 downloads  

 

vusec-logo_large