Victor van der Veen
Victor van der Veen
Qualcomm Product Security
Verified email at - Homepage
Cited by
Cited by
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
CCS '16, 2016
Andrubis - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
M Lindorfer, M Neugschwandtner, L Weichselbaum, Y Fratantonio, ...
BADGERS '14, 2014
Practical Context-Sensitive CFI
V van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
CCS '15, 2015
A Tough call: Mitigating Advanced Code-Reuse Attacks At The Binary Level
V van der Veen, E Göktaş, M Contag, A Pawlowski, X Chen, S Rawat, ...
S&P '16, 2016
Memory Errors: The Past, the Present, and the Future
V van der Veen, N dutt-Sharma, L Cavallaro, H Bos
RAID '12, 2012
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
D Andriesse, X Chen, V van der Veen, A Slowinska, H Bos
USENIX Sec '16, 2016
TRRespass: Exploiting the Many Sides of Target Row Refresh
P Frigo, E Vannacci, H Hassan, V van der Veen, O Mutlu, C Giuffrida, ...
S&P '20, 2020
Andrubis: Android Malware Under the Magnifying Glass
L Weichselbaum, M Neugschwandtner, M Lindorfer, Y Fratantonio, ...
Vienna University of Technology, Technical Report, 2014
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later
V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ...
CCS '17, 2017
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM
V van der Veen, M Lindorfer, Y Fratantonio, HP Pillai, G Vigna, C Kruegel, ...
DIMVA '18, 2018
Blacksmith: Scalable Rowhammering in the Frequency Domain
P Jattke, V van der Veen, P Frigo, S Gunter, K Razavi
S&P 2022, 2022
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
H Hassan, YC Tugrul, JS Kim, V Van der Veen, K Razavi, O Mutlu
MICRO-54, 2021
Enter Sandbox: Android Sandbox Comparison
S Neuner, V van der Veen, M Lindorfer, M Huber, G Merzdovnik, ...
MoST '14, 2014
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication
RK Konoth, V van der Veen, H Bos
FC '16, 2016
Dynamic Analysis of Android Malware
V van der Veen, H Bos, C Rossow
Vrije Universiteit Amsterdam, 2013
MARX: Uncovering Class Hierarchies in C++ Programs
A Pawlowski, M Contag, V van der Veen, C Ouwehand, T Holz, H Bos, ...
NDSS '17, 2017
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching
A Pawlowski, V van der Veen, D Andriesse, E van der Kouwe, T Holz, ...
ACSAC '19, 2019
DroydSeuss: A Mobile Banking Trojan Tracker - Short Paper
A Coletta, V van der Veen, F Maggi
FC '16, 2016
DramaQueen: Revisiting Side Channels in DRAM
V van der Veen, B Gras
DRAMSec '23, 2023
Dram with quick random row refresh for rowhammer mitigation
V VAN DER VEEN, M Saifuddin, P Deshmukh, B Dashtipour, D Hartley
US Patent App. 17/445,220, 2022
The system can't perform the operation now. Try again later.
Articles 1–20