No Need to Hide: Protecting Safe Regions on Commodity Hardware K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017 | 64 | 2017 |
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization K Koning, H Bos, C Giuffrida Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016 | 44 | 2016 |
Delta pointers: Buffer overflow checks without the checks T Kroes, K Koning, E van der Kouwe, H Bos, C Giuffrida Proceedings of the Thirteenth EuroSys Conference, 1-14, 2018 | 24 | 2018 |
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution S Österlund, K Koning, P Olivier, A Barbalace, H Bos, C Giuffrida International Conference on Architectural Support for Programming Languages …, 2019 | 14 | 2019 |
Trap handling with hardware multi-threading K Koning University of Amsterdam, 2013 | 14 | 2013 |
Towards automated vulnerability scanning of network servers N Schagen, K Koning, H Bos, C Giuffrida Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018 | 7 | 2018 |
Fast and generic metadata management with mid-fat pointers T Kroes, K Koning, C Giuffrida, H Bos, E van der Kouwe Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 7 | 2017 |
AM: Towards A Hardware Unix Accelerator for Many-Cores R Poss, K Koning IEEE Transactions on Parallel and Distributed Systems 27 (8), 2208-2221, 2015 | | 2015 |