On the Security of Two-Round Multi-Signatures |
40th IEEE Symposium on Security and Privacy
|
SoK: Make JIT-Spray Great Again |
WOOT '18
|
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis |
Black Hat Asia 2018
|
Bypassing Clang's SafeStack for Fun and Profit |
Black Hat Europe 2016
|
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications |
36th IEEE Symposium on Security and Privacy
|
VC3: Trustworthy Data Analytics in the Cloud using SGX |
36th IEEE Symposium on Security and Privacy
|