What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lucas Davi
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space.
Johannes Willbold
Tobias Cloosters
Simon Wörner
Felix Buchmann
Moritz Schloegel
Lucas Davi
Thorsten Holz
2025
conf/acns
HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts.
Jens-Rene Giesen
Sébastien Andreina
Michael Rodler
Ghassan Karame
Lucas Davi
2025
conf/uss
Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems.
Philipp Mackensen
Christian Niesler
Roberto Blanco
Lucas Davi
Veelasha Moonsamy
2024
conf/ccs
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers.
Sébastien Andreina
Tobias Cloosters
Lucas Davi
Jens-Rene Giesen
Marco Gutfleisch
Ghassan Karame
Alena Naiakshina
Houda Naji
2023
conf/ccs
Fuzz on the Beach: Fuzzing Solana Smart Contracts.
Sven Smolka
Jens-Rene Giesen
Pascal Winkler
Oussama Draissi
Lucas Davi
Ghassan Karame
Klaus Pohl
2023
conf/uss
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.
Jan Philipp Thoma
Christian Niesler
Dominic A. Funke
Gregor Leander
Pierre Mayr
Nils Pohl
Lucas Davi
Tim Güneysu
2023
conf/acns
DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access.
Sebastian Surminski
Christian Niesler
Lucas Davi
Ahmad-Reza Sadeghi
2023
conf/eurosp
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Michael Rodler
David Paaßen
Wenting Li
Lukas Bernhard
Thorsten Holz
Ghassan Karame
Lucas Davi
2022
conf/uss
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.
Tobias Cloosters
Johannes Willbold
Thorsten Holz
Lucas Davi
2022
conf/eurosp
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Lukas Bernhard
Michael Rodler
Thorsten Holz
Lucas Davi
2021
conf/ccs
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Sebastian Surminski
Christian Niesler
Ferdinand Brasser
Lucas Davi
Ahmad-Reza Sadeghi
2021
conf/uss
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
Michael Rodler
Wenting Li
Ghassan O. Karame
Lucas Davi
2021
conf/esorics
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers.
David Paaßen
Sebastian Surminski
Michael Rodler
Lucas Davi
2021
conf/ndss
HERA: Hotpatching of Embedded Real-time Applications.
Christian Niesler
Sebastian Surminski
Lucas Davi
2020
conf/uss
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
Tobias Cloosters
Michael Rodler
Lucas Davi
2019
conf/ndss
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Michael Rodler
Wenting Li
Ghassan O. Karame
Lucas Davi
2018
conf/uss
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Andrea Biondo
Mauro Conti
Lucas Davi
Tommaso Frassetto
Ahmad-Reza Sadeghi
2018
conf/ndss
K-Miner: Uncovering Memory Corruption in Linux.
David Gens
Simon Schmitt
Lucas Davi
Ahmad-Reza Sadeghi
2017
conf/uss
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Ferdinand Brasser
Lucas Davi
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2017
conf/ndss
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Robert Rudd
Richard Skowyra
David Bigelow
Veer Dedhia
Thomas Hobson
Stephen Crane
Christopher Liebchen
Per Larsen
Lucas Davi
Michael Franz
Ahmad-Reza Sadeghi
Hamed Okhravi
2017
conf/ndss
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Lucas Davi
David Gens
Christopher Liebchen
Ahmad-Reza Sadeghi
2017
conf/acsac
Breaking and Fixing Destructive Code Read Defenses.
Jannik Pewny
Philipp Koppe
Lucas Davi
Thorsten Holz
2016
conf/ccs
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Luke Deshotels
Razvan Deaconescu
Mihai Chiroiu
Lucas Davi
William Enck
Ahmad-Reza Sadeghi
2016
conf/ccs
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Tigist Abera
N. Asokan
Lucas Davi
Jan-Erik Ekberg
Thomas Nyman
Andrew Paverd
Ahmad-Reza Sadeghi
Gene Tsudik
2016
conf/ndss
Leakage-Resilient Layout Randomization for Mobile Devices.
Kjell Braden
Lucas Davi
Christopher Liebchen
Ahmad-Reza Sadeghi
Stephen Crane
Michael Franz
Per Larsen
2015
conf/ccs
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Stephen J. Crane
Stijn Volckaert
Felix Schuster
Christopher Liebchen
Per Larsen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
Bjorn De Sutter
Michael Franz
2015
conf/ccs
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Mauro Conti
Stephen Crane
Lucas Davi
Michael Franz
Per Larsen
Marco Negro
Christopher Liebchen
Mohaned Qunaibit
Ahmad-Reza Sadeghi
2015
conf/ccs
XiOS: Extended Application Sandboxing on iOS.
Mihai Bucicoiu
Lucas Davi
Razvan Deaconescu
Ahmad-Reza Sadeghi
2015
conf/ccs
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Ahmad-Reza Sadeghi
Lucas Davi
Per Larsen
2015
conf/sp
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Stephen Crane
Christopher Liebchen
Andrei Homescu
Lucas Davi
Per Larsen
Ahmad-Reza Sadeghi
Stefan Brunthaler
Michael Franz
2015
conf/sp
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Felix Schuster
Thomas Tendyck
Christopher Liebchen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2015
conf/ndss
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Lucas Davi
Christopher Liebchen
Ahmad-Reza Sadeghi
Kevin Z. Snow
Fabian Monrose
2014
conf/ccs
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Ahmad-Reza Sadeghi
Lucas Davi
2014
conf/uss
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Lucas Davi
Ahmad-Reza Sadeghi
Daniel Lehmann
Fabian Monrose
2013
conf/ccs
PSiOS: bring your own privacy & security to iOS devices.
Tim Werthmann
Ralf Hund
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
2013
conf/sp
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Kevin Z. Snow
Fabian Monrose
Lucas Davi
Alexandra Dmitrienko
Christopher Liebchen
Ahmad-Reza Sadeghi
2012
conf/ndss
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2012
conf/ndss
Towards Taming Privilege-Escalation Attacks on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
ROPdefender: a detection tool to defend against return-oriented programming attacks.
Lucas Davi
Ahmad-Reza Sadeghi
Marcel Winandy
2011
conf/ccs
Practical and lightweight domain isolation on Android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Stephan Heuser
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Poster: the quest for security against privilege escalation attacks on android.
Sven Bugiel
Lucas Davi
Alexandra Dmitrienko
Thomas Fischer
Ahmad-Reza Sadeghi
Bhargava Shastry
2011
conf/ccs
Trusted virtual domains on OKL4: secure information sharing on smartphones.
Lucas Davi
Alexandra Dmitrienko
Christoph Kowalski
Marcel Winandy
2011
conf/ccs
Poster: control-flow integrity for smartphones.
Lucas Davi
Alexandra Dmitrienko
Manuel Egele
Thomas Fischer
Thorsten Holz
Ralf Hund
Stefan Nürnberger
Ahmad-Reza Sadeghi
2010
conf/ccs
Return-oriented programming without returns.
Stephen Checkoway
Lucas Davi
Alexandra Dmitrienko
Ahmad-Reza Sadeghi
Hovav Shacham
Marcel Winandy
2009
conf/ccs
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Lucas Davi
Ahmad-Reza Sadeghi
Marcel Winandy
Coauthors
Ahmad-Reza Sadeghi
(29)
Alena Naiakshina
(1)
Alexandra Dmitrienko
(8)
Andrea Biondo
(1)
Andrei Homescu
(1)
Andrew Paverd
(1)
Bhargava Shastry
(3)
Bjorn De Sutter
(1)
Christian Niesler
(5)
Christoph Kowalski
(1)
Christopher Liebchen
(10)
Daniel Lehmann
(1)
David Bigelow
(1)
David Gens
(3)
David Paaßen
(2)
Dominic A. Funke
(1)
Fabian Monrose
(3)
Felix Buchmann
(1)
Felix Schuster
(2)
Ferdinand Brasser
(2)
Gene Tsudik
(1)
Ghassan Karame
(4)
Ghassan O. Karame
(2)
Gregor Leander
(1)
Hamed Okhravi
(1)
Houda Naji
(1)
Hovav Shacham
(1)
Jan Philipp Thoma
(1)
Jan-Erik Ekberg
(1)
Jannik Pewny
(1)
Jens-Rene Giesen
(3)
Johannes Willbold
(2)
Kevin Z. Snow
(2)
Kjell Braden
(1)
Klaus Pohl
(1)
Lucas Davi
(45)
Lukas Bernhard
(2)
Luke Deshotels
(1)
Manuel Egele
(2)
Marcel Winandy
(4)
Marco Gutfleisch
(1)
Marco Negro
(1)
Mauro Conti
(2)
Michael Franz
(5)
Michael Rodler
(7)
Mihai Bucicoiu
(1)
Mihai Chiroiu
(1)
Mohaned Qunaibit
(1)
Moritz Schloegel
(1)
N. Asokan
(1)
Nils Pohl
(1)
Oussama Draissi
(1)
Pascal Winkler
(1)
Per Larsen
(6)
Philipp Koppe
(1)
Philipp Mackensen
(1)
Pierre Mayr
(1)
Ralf Hund
(3)
Razvan Deaconescu
(2)
Richard Skowyra
(1)
Robert Rudd
(1)
Roberto Blanco
(1)
Sebastian Surminski
(4)
Sébastien Andreina
(2)
Simon Schmitt
(1)
Simon Wörner
(1)
Stefan Brunthaler
(1)
Stefan Nürnberger
(2)
Stephan Heuser
(1)
Stephen Checkoway
(1)
Stephen Crane
(4)
Stephen J. Crane
(1)
Stijn Volckaert
(1)
Sven Bugiel
(3)
Sven Smolka
(1)
Thomas Fischer
(4)
Thomas Hobson
(1)
Thomas Nyman
(1)
Thomas Tendyck
(1)
Thorsten Holz
(10)
Tigist Abera
(1)
Tim Güneysu
(1)
Tim Werthmann
(1)
Tobias Cloosters
(4)
Tommaso Frassetto
(1)
Veelasha Moonsamy
(1)
Veer Dedhia
(1)
Wenting Li
(3)
William Enck
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to