Follow
Per Larsen
Per Larsen
Immunant, Inc.
Verified email at immunant.com - Homepage
Title
Cited by
Cited by
Year
SoK: Automated software diversity
P Larsen, A Homescu, S Brunthaler, M Franz
2014 IEEE Symposium on Security and Privacy, 276-291, 2014
4142014
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
2922015
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
2632017
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
2062015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1872015
Thwarting cache side-channel attacks through dynamic software diversity.
S Crane, A Homescu, S Brunthaler, P Larsen, M Franz
NDSS, 8-11, 2015
1762015
Profile-guided automated software diversity
A Homescu, S Neisius, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013
1702013
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1552015
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1122016
SoK: Sanitizing for security
D Song, J Lettner, P Rajasekaran, Y Na, S Volckaert, P Larsen, M Franz
2019 IEEE Symposium on Security and Privacy (SP), 1275-1295, 2019
1102019
Librando: transparent code randomization for just-in-time compilers
A Homescu, S Brunthaler, P Larsen, M Franz
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013
1052013
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming.
A Homescu, M Stewart, P Larsen, S Brunthaler, M Franz
WOOT 12, 64-76, 2012
792012
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
732017
Booby trapping software
S Crane, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013
702013
Diversifying the software stack using randomized NOP insertion
T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz
Moving target defense II, 151-173, 2013
652013
Secure and efficient application monitoring and replication
S Volckaert, B Coppens, A Voulimeneas, A Homescu, P Larsen, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 167-179, 2016
632016
Security through diversity: Are we there yet?
P Larsen, S Brunthaler, M Franz
IEEE Security & Privacy 12 (2), 28-35, 2013
592013
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
D Sullivan, O Arias, L Davi, P Larsen, AR Sadeghi, Y Jin
2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2016
512016
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proc. Priv. Enhancing Technol. 2016 (4), 454-469, 2016
502016
Large-scale automated software diversity—program evolution redux
A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz
IEEE Transactions on Dependable and Secure Computing 14 (2), 158-171, 2015
382015
The system can't perform the operation now. Try again later.
Articles 1–20