Koen Koning
Cited by
Cited by
No Need to Hide: Protecting Safe Regions on Commodity Hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization
K Koning, H Bos, C Giuffrida
Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016
Delta pointers: Buffer overflow checks without the checks
T Kroes, K Koning, E van der Kouwe, H Bos, C Giuffrida
Proceedings of the Thirteenth EuroSys Conference, 1-14, 2018
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution
S Österlund, K Koning, P Olivier, A Barbalace, H Bos, C Giuffrida
International Conference on Architectural Support for Programming Languages …, 2019
Towards automated vulnerability scanning of network servers
N Schagen, K Koning, H Bos, C Giuffrida
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
Trap handling with hardware multi-threading
K Koning
University of Amsterdam, 2013
Fast and generic metadata management with mid-fat pointers
T Kroes, K Koning, C Giuffrida, H Bos, E van der Kouwe
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
Shared accelerator memory systems and methods
S Kumar, D Koufaty, P Lantz, P Marolia, R Sankaran, K Koning
US Patent 10,817,441, 2020
Tricking Hardware into Efficiently Securing Software
K Koning
Vrije Universiteit Amsterdam, 2021
AM: Towards A Hardware Unix Accelerator for Many-Cores
R Poss, K Koning
IEEE Transactions on Parallel and Distributed Systems 27 (8), 2208-2221, 2015
BugsBunny: Hopping to RTL Targets with a Directed Hardware-Design Fuzzer
H Ragab, K Koning, H Bos, C Giuffrida
The system can't perform the operation now. Try again later.
Articles 1–11