What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Herbert Bos
Google Scholar
ORCID:
0000-0001-6179-1510
78
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet?
Magdalena Steinböck
Jens Troost
Wilco Van Beijnum
Jan Seredynski
Herbert Bos
Martina Lindorfer
Andrea Continella
2025
conf/eurosp
LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing.
Elia Geretto
Andrea Jemmett
Cristiano Giuffrida
Herbert Bos
2025
conf/uss
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks.
Alvise de Faveri Tron
Raphael Isemann
Hany Ragab
Cristiano Giuffrida
Klaus von Gleissenthall
Herbert Bos
2024
conf/uss
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
Sander Wiebing
Alvise de Faveri Tron
Herbert Bos
Cristiano Giuffrida
2024
conf/uss
Practical Data-Only Attack Generation.
Brian Johannesmeyer
Asia Slowinska
Herbert Bos
Cristiano Giuffrida
2024
conf/sp
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags.
Floris Gorter
Taddeus Kroes
Herbert Bos
Cristiano Giuffrida
2023
conf/uss
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit.
Floris Gorter
Enrico Barberis
Raphael Isemann
Erik van der Kouwe
Cristiano Giuffrida
Herbert Bos
2023
conf/uss
Uncontained: Uncovering Container Confusion in the Linux Kernel.
Jakob Koschel
Pietro Borrello
Daniele Cono D'Elia
Herbert Bos
Cristiano Giuffrida
2023
conf/ndss
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.
Andrea Di Dio
Koen Koning
Herbert Bos
Cristiano Giuffrida
2023
conf/acsac
Triereme: Speeding up hybrid fuzzing through efficient query scheduling.
Elia Geretto
Julius Hohnerlein
Cristiano Giuffrida
Herbert Bos
Erik van der Kouwe
Klaus von Gleissenthall
2022
conf/ccs
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access.
Floris Gorter
Koen Koning
Herbert Bos
Cristiano Giuffrida
2022
conf/uss
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
Enrico Barberis
Pietro Frigo
Marius Muench
Herbert Bos
Cristiano Giuffrida
2022
conf/uss
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.
Andrei Tatar
Daniël Trujillo
Cristiano Giuffrida
Herbert Bos
2022
conf/ndss
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Brian Johannesmeyer
Jakob Koschel
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2022
conf/acsac
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots.
Elia Geretto
Cristiano Giuffrida
Herbert Bos
Erik van der Kouwe
2021
conf/uss
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
Finn de Ridder
Pietro Frigo
Emanuele Vannacci
Herbert Bos
Cristiano Giuffrida
Kaveh Razavi
2021
conf/uss
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks.
Hany Ragab
Enrico Barberis
Herbert Bos
Cristiano Giuffrida
2021
conf/sp
CrossTalk: Speculative Data Leaks Across Cores Are Real.
Hany Ragab
Alyssa Milburn
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2021
conf/dsn
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection.
Koustubha Bhat
Erik van der Kouwe
Herbert Bos
Cristiano Giuffrida
2020
conf/ccs
Speculative Probing: Hacking Blind in the Spectre Era.
Enes Göktas
Kaveh Razavi
Georgios Portokalidis
Herbert Bos
Cristiano Giuffrida
2020
conf/uss
ParmeSan: Sanitizer-guided Greybox Fuzzing.
Sebastian Österlund
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2020
conf/sp
: Practical Cache Attacks from the Network.
Michael Kurth
Ben Gras
Dennis Andriesse
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/sp
TRRespass: Exploiting the Many Sides of Target Row Refresh.
Pietro Frigo
Emanuele Vannacci
Hasan Hassan
Victor van der Veen
Onur Mutlu
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/eurosp
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
Radhesh Krishnan Konoth
Björn Fischer
Wan J. Fokkink
Elias Athanasopoulos
Kaveh Razavi
Herbert Bos
2020
conf/eurosp
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
Jakob Koschel
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/ndss
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
Ben Gras
Cristiano Giuffrida
Michael Kurth
Herbert Bos
Kaveh Razavi
2020
conf/acsac
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing.
Emre Güler
Philipp Görz
Elia Geretto
Andrea Jemmett
Sebastian Österlund
Herbert Bos
Cristiano Giuffrida
Thorsten Holz
2019
conf/sp
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
Lucian Cojocar
Kaveh Razavi
Cristiano Giuffrida
Herbert Bos
2019
conf/sp
RIDL: Rogue In-Flight Data Load.
Stephan van Schaik
Alyssa Milburn
Sebastian Österlund
Pietro Frigo
Giorgi Maisuradze
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2019
conf/eurosp
SoK: Benchmarking Flaws in Systems Security.
Erik van der Kouwe
Gernot Heiser
Dennis Andriesse
Herbert Bos
Cristiano Giuffrida
2019
conf/acsac
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Andre Pawlowski
Victor van der Veen
Dennis Andriesse
Erik van der Kouwe
Thorsten Holz
Cristiano Giuffrida
Herbert Bos
2018
conf/ccs
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
Radhesh Krishnan Konoth
Emanuele Vineti
Veelasha Moonsamy
Martina Lindorfer
Christopher Kruegel
Herbert Bos
Giovanni Vigna
2018
conf/uss
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
Ben Gras
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2018
conf/uss
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
Stephan van Schaik
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2018
conf/sp
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
Pietro Frigo
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2018
conf/eurosp
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Enes Göktas
Benjamin Kollenda
Philipp Koppe
Erik Bosman
Georgios Portokalidis
Thorsten Holz
Herbert Bos
Cristiano Giuffrida
2018
conf/acsac
TIFF: Using Input Type Inference To Improve Fuzzing.
Vivek Jain
Sanjay Rawat
Cristiano Giuffrida
Herbert Bos
2018
conf/acsac
Type-After-Type: Practical and Complete Type-Safe Memory Reuse.
Erik van der Kouwe
Taddeus Kroes
Chris Ouwehand
Herbert Bos
Cristiano Giuffrida
2018
conf/acsac
Now You See Me: Real-time Dynamic Function Call Detection.
Franck de Goër
Sanjay Rawat
Dennis Andriesse
Herbert Bos
Roland Groz
2017
conf/ccs
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.
Victor van der Veen
Dennis Andriesse
Manolis Stamatogiannakis
Xi Chen
Herbert Bos
Cristiano Giuffrida
2017
conf/eurosp
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks.
Xi Chen
Herbert Bos
Cristiano Giuffrida
2017
conf/eurosp
Compiler-Agnostic Function Detection in Binaries.
Dennis Andriesse
Asia Slowinska
Herbert Bos
2017
conf/ndss
Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.
Alyssa Milburn
Herbert Bos
Cristiano Giuffrida
2017
conf/ndss
MARX: Uncovering Class Hierarchies in C++ Programs.
Andre Pawlowski
Moritz Contag
Victor van der Veen
Chris Ouwehand
Thorsten Holz
Herbert Bos
Elias Athanasopoulos
Cristiano Giuffrida
2017
conf/ndss
ASLR on the Line: Practical Cache Attacks on the MMU.
Ben Gras
Kaveh Razavi
Erik Bosman
Herbert Bos
Cristiano Giuffrida
2017
conf/ndss
VUzzer: Application-aware Evolutionary Fuzzing.
Sanjay Rawat
Vivek Jain
Ashish Kumar
Lucian Cojocar
Cristiano Giuffrida
Herbert Bos
2017
conf/dsn
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables.
Benjamin Kollenda
Enes Göktas
Tim Blazytko
Philipp Koppe
Robert Gawlik
Radhesh Krishnan Konoth
Cristiano Giuffrida
Herbert Bos
Thorsten Holz
2016
conf/ccs
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clémentine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
2016
conf/ccs
TypeSan: Practical Type Confusion Detection.
István Haller
Yuseok Jeon
Hui Peng
Mathias Payer
Cristiano Giuffrida
Herbert Bos
Erik van der Kouwe
2016
conf/ccs
POSTER: Identifying Dynamic Data Structures in Malware.
Thomas Rupprecht
Xi Chen
David H. White
Jan Tobias Mühlberg
Herbert Bos
Gerald Lüttgen
2016
conf/uss
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries.
Dennis Andriesse
Xi Chen
Victor van der Veen
Asia Slowinska
Herbert Bos
2016
conf/uss
Flip Feng Shui: Hammering a Needle in the Software Stack.
Kaveh Razavi
Ben Gras
Erik Bosman
Bart Preneel
Cristiano Giuffrida
Herbert Bos
2016
conf/uss
Undermining Information Hiding (and What to Do about It).
Enes Göktas
Robert Gawlik
Benjamin Kollenda
Elias Athanasopoulos
Georgios Portokalidis
Cristiano Giuffrida
Herbert Bos
2016
conf/uss
Poking Holes in Information Hiding.
Angelos Oikonomopoulos
Elias Athanasopoulos
Herbert Bos
Cristiano Giuffrida
2016
conf/fc
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication.
Radhesh Krishnan Konoth
Victor van der Veen
Herbert Bos
2016
conf/sp
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.
Erik Bosman
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2016
conf/sp
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
Victor van der Veen
Enes Göktas
Moritz Contag
Andre Pawlowski
Xi Chen
Sanjay Rawat
Herbert Bos
Thorsten Holz
Elias Athanasopoulos
Cristiano Giuffrida
2016
conf/esorics
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming.
Spandan Veggalam
Sanjay Rawat
István Haller
Herbert Bos
2016
conf/dsn
Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization.
Koen Koning
Herbert Bos
Cristiano Giuffrida
2016
conf/dsn
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems.
Koustubha Bhat
Dirk Vogt
Erik van der Kouwe
Ben Gras
Lionel Sambuc
Andrew S. Tanenbaum
Herbert Bos
Cristiano Giuffrida
2015
conf/ccs
Practical Context-Sensitive CFI.
Victor van der Veen
Dennis Andriesse
Enes Göktas
Ben Gras
Lionel Sambuc
Asia Slowinska
Herbert Bos
Cristiano Giuffrida
2015
conf/ndss
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Xi Chen
Asia Slowinska
Dennis Andriesse
Herbert Bos
Cristiano Giuffrida
2015
conf/dsn
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming.
Dennis Andriesse
Herbert Bos
Asia Slowinska
2015
conf/dsn
Lightweight Memory Checkpointing.
Dirk Vogt
Cristiano Giuffrida
Herbert Bos
Andrew S. Tanenbaum
2015
conf/acsac
ShrinkWrap: VTable Protection without Loose Ends.
István Haller
Enes Göktas
Elias Athanasopoulos
Georgios Portokalidis
Herbert Bos
2015
conf/acsac
PIE: Parser Identification in Embedded Systems.
Lucian Cojocar
Jonas Zaddach
Roel Verdult
Herbert Bos
Aurélien Francillon
Davide Balzarotti
2014
conf/uss
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
Enes Göktas
Elias Athanasopoulos
Michalis Polychronakis
Herbert Bos
Georgios Portokalidis
2014
conf/sp
Out of Control: Overcoming Control-Flow Integrity.
Enes Göktas
Elias Athanasopoulos
Herbert Bos
Georgios Portokalidis
2014
conf/sp
Framing Signals - A Return to Portable Shellcode.
Erik Bosman
Herbert Bos
2013
conf/uss
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.
István Haller
Asia Slowinska
Matthias Neugschwandtner
Herbert Bos
2013
conf/sp
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Christian Rossow
Dennis Andriesse
Tillmann Werner
Brett Stone-Gross
Daniel Plohmann
Christian J. Dietrich
Herbert Bos
2012
conf/sp
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Christian Rossow
Christian J. Dietrich
Chris Grier
Christian Kreibich
Vern Paxson
Norbert Pohlmann
Herbert Bos
Maarten van Steen
2012
conf/dsn
Keep net working - on a dependable and fast networking stack.
Tomás Hrubý
Dirk Vogt
Herbert Bos
Andrew S. Tanenbaum
2011
conf/ndss
Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Asia Slowinska
Traian Stancescu
Herbert Bos
2010
conf/acsac
Paranoid Android: versatile protection for smartphones.
Georgios Portokalidis
Philip Homburg
Kostas Anagnostakis
Herbert Bos
2009
conf/dsn
Fault isolation for device drivers.
Jorrit N. Herder
Herbert Bos
Ben Gras
Philip Homburg
Andrew S. Tanenbaum
2007
conf/dsn
Failure Resilience for Device Drivers.
Jorrit N. Herder
Herbert Bos
Ben Gras
Philip Homburg
Andrew S. Tanenbaum
2007
conf/acsac
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack.
Asia Slowinska
Herbert Bos
Coauthors
Alvise de Faveri Tron
(2)
Alyssa Milburn
(3)
Andre Pawlowski
(3)
Andrea Continella
(1)
Andrea Di Dio
(1)
Andrea Jemmett
(2)
Andrei Tatar
(1)
Andrew S. Tanenbaum
(5)
Angelos Oikonomopoulos
(1)
Ashish Kumar
(1)
Asia Slowinska
(9)
Aurélien Francillon
(1)
Bart Preneel
(1)
Ben Gras
(9)
Benjamin Kollenda
(3)
Björn Fischer
(1)
Brett Stone-Gross
(1)
Brian Johannesmeyer
(2)
Chris Grier
(1)
Chris Ouwehand
(2)
Christian J. Dietrich
(2)
Christian Kreibich
(1)
Christian Rossow
(2)
Christopher Kruegel
(1)
Clémentine Maurice
(1)
Cristiano Giuffrida
(54)
Daniel Gruss
(1)
Daniel Plohmann
(1)
Daniël Trujillo
(1)
Daniele Cono D'Elia
(1)
David H. White
(1)
Davide Balzarotti
(1)
Dennis Andriesse
(11)
Dirk Vogt
(3)
Elia Geretto
(4)
Elias Athanasopoulos
(8)
Emanuele Vannacci
(2)
Emanuele Vineti
(1)
Emre Güler
(1)
Enes Göktas
(9)
Enrico Barberis
(3)
Erik Bosman
(5)
Erik van der Kouwe
(9)
Finn de Ridder
(1)
Floris Gorter
(3)
Franck de Goër
(1)
Georgios Portokalidis
(7)
Gerald Lüttgen
(1)
Gernot Heiser
(1)
Giorgi Maisuradze
(1)
Giovanni Vigna
(2)
Hany Ragab
(3)
Hasan Hassan
(1)
Herbert Bos
(78)
Hui Peng
(1)
István Haller
(4)
Jakob Koschel
(3)
Jan Seredynski
(1)
Jan Tobias Mühlberg
(1)
Jens Troost
(1)
Jonas Zaddach
(1)
Jorrit N. Herder
(2)
Julius Hohnerlein
(1)
Kaveh Razavi
(19)
Klaus von Gleissenthall
(2)
Koen Koning
(3)
Kostas Anagnostakis
(1)
Koustubha Bhat
(2)
Lionel Sambuc
(2)
Lucian Cojocar
(3)
Maarten van Steen
(1)
Magdalena Steinböck
(1)
Manolis Stamatogiannakis
(1)
Marius Muench
(1)
Martina Lindorfer
(3)
Mathias Payer
(1)
Matthias Neugschwandtner
(1)
Michael Kurth
(2)
Michalis Polychronakis
(1)
Moritz Contag
(2)
Norbert Pohlmann
(1)
Onur Mutlu
(1)
Philip Homburg
(3)
Philipp Görz
(1)
Philipp Koppe
(2)
Pietro Borrello
(1)
Pietro Frigo
(5)
Radhesh Krishnan Konoth
(4)
Raphael Isemann
(2)
Robert Gawlik
(2)
Roel Verdult
(1)
Roland Groz
(1)
Sander Wiebing
(1)
Sanjay Rawat
(5)
Sebastian Österlund
(3)
Spandan Veggalam
(1)
Stephan van Schaik
(2)
Taddeus Kroes
(2)
Thomas Rupprecht
(1)
Thorsten Holz
(6)
Tillmann Werner
(1)
Tim Blazytko
(1)
Tomás Hrubý
(1)
Traian Stancescu
(1)
Veelasha Moonsamy
(1)
Vern Paxson
(1)
Victor van der Veen
(9)
Vivek Jain
(2)
Wan J. Fokkink
(1)
Wilco Van Beijnum
(1)
Xi Chen
(6)
Yanick Fratantonio
(1)
Yuseok Jeon
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to