default search action
Dennis Andriesse
Person information
- affiliation: VU University Amsterdam, Department of Computer Science, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j1]Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
Benchmarking Flaws Undermine Security Research. IEEE Secur. Priv. 18(3): 48-57 (2020) - [c15]Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
: Practical Cache Attacks from the Network. SP 2020: 20-38 - [i2]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. CoRR abs/2007.03302 (2020)
2010 – 2019
- 2019
- [c14]Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. ACSAC 2019: 97-112 - [c13]Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
SoK: Benchmarking Flaws in Systems Security. EuroS&P 2019: 310-325 - 2018
- [c12]Franck de Goër, Sanjay Rawat, Dennis Andriesse, Herbert Bos, Roland Groz:
Now You See Me: Real-time Dynamic Function Call Detection. ACSAC 2018: 618-628 - [c11]Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. OSDI 2018: 697-710 - [i1]Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser:
Benchmarking Crimes: An Emerging Threat in Systems Security. CoRR abs/1801.02381 (2018) - 2017
- [c10]Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida:
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. CCS 2017: 1675-1689 - [c9]Dennis Andriesse, Asia Slowinska, Herbert Bos:
Compiler-Agnostic Function Detection in Binaries. EuroS&P 2017: 177-189 - 2016
- [c8]Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, Herbert Bos:
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. USENIX Security Symposium 2016: 583-600 - 2015
- [c7]Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida:
Practical Context-Sensitive CFI. CCS 2015: 927-940 - [c6]Dennis Andriesse, Herbert Bos, Asia Slowinska:
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming. DSN 2015: 125-135 - [c5]Dennis Andriesse, Christian Rossow, Herbert Bos:
Reliable Recon in Adversarial Peer-to-Peer Botnets. Internet Measurement Conference 2015: 129-140 - [c4]Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. NDSS 2015 - 2014
- [c3]Dennis Andriesse, Herbert Bos:
Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract). DIMVA 2014: 41-50 - 2013
- [c2]Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos:
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. MALWARE 2013: 116-123 - [c1]Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos:
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. IEEE Symposium on Security and Privacy 2013: 97-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint