Follow
Christopher Liebchen
Christopher Liebchen
Technische Universität Darmstadt
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
6532013
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
F Schuster, T Tendyck, C Liebchen, L Davi, AR Sadeghi, T Holz
2015 IEEE Symposium on Security and Privacy, 745-762, 2015
4362015
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
2015 IEEE Symposium on Security and Privacy, 763-780, 2015
2922015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
2212015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1872015
It's a TRaP: Table randomization and protection against function-reuse attacks
SJ Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1552015
On the (in) security of mobile two-factor authentication
A Dmitrienko, C Liebchen, C Rossow, AR Sadeghi
International Conference on Financial Cryptography and Data Security, 365-383, 2014
1262014
Leakage-Resilient Layout Randomization for Mobile Devices.
K Braden, L Davi, C Liebchen, AR Sadeghi, S Crane, M Franz, P Larsen
NDSS 16, 21-24, 2016
1122016
{CAn’t} Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
26th USENIX Security Symposium (USENIX Security 17), 117-130, 2017
822017
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
NDSS, 2017
732017
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
L Davi, D Gens, C Liebchen, AR Sadeghi
NDSS, 2017
612017
{IMIX}:{In-Process} Memory Isolation {EXtension}
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 83-97, 2018
572018
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proc. Priv. Enhancing Technol. 2016 (4), 454-469, 2016
512016
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
472016
Jitguard: hardening just-in-time compilers with sgx
T Frassetto, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
412017
Can't touch this: Practical and generic software-only defenses against rowhammer attacks
F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi
arXiv preprint arXiv:1611.08396, 2016
292016
Lazarus: Practical side-channel resilient kernel-space randomization
D Gens, O Arias, D Sullivan, C Liebchen, Y Jin, AR Sadeghi
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
212017
Rip-rh: Preventing rowhammer-based inter-process attacks
C Bock, F Brasser, D Gens, C Liebchen, AR Sadeghi
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
152019
Advancing memory-corruption attacks and defenses
C Liebchen
Technische Universität, 2018
72018
Over-the-air cross-platform infection for breaking mTAN-based online banking authentication
L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
Black Hat Abu Dhabi, 1-12, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20