Systems Security
 
    Systems Security

   Kevin Z. Snow, Roman Rogowski, Jan Werner, Hyungjoon Koo, Fabian Monrose and Michalis Polychronakis. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code-Inference Attacks. In Proceedings of IEEE Security and Privacy Symposium, 2016 (PDF)


   Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose and Michalis Polychronakis. No-Execute-After-Read: Preventing Code Disclosures in Commodity Software. In Proceedings of ACM Asia Conference on Computer and Communications Security, 2016 (PDF)


   Lucas Davi, Christopher Liebchen, Ahamd-Reza Sadegi, Kevin Z. Snow and Fabian Monrose. Isomeron: Code Randomization Resilient to (Just-in-time) Return Oriented Programming. In Proceedings of the Network and Distributed Systems Security Symposium, 2015 (PDF)


     Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann and Fabian Monrose. Stitching the Gadgets: On the ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proceedings of the USENIX Security Symposium, 2014 (PDF)


    Kevin Snow, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, Fabian Monrose and Ahmad-Reza Sadeghi. Just-in-time Code Reuse: On the Effectiveness of Fine-grained Address Space Layout Randomization. In Proceedings of the IEEE Symposium on Security and Privacy, 2013 (Best Student Paper Award).  (PDF)


      Blaine Stancill, Kevin Snow, Nathan Otterness, and Fabian Monrose. Check my Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, 2013. (PDF)


       Kevin Snow and Fabian Monrose. Automatic Hooking for Forensic Analysis of  Document-based Code Injection Attacks: Techniques and Empirical Analyses. In Proceedings of the European Workshop on System Security, 2012.  (PDF)


◦Kevin Snow, Srinivas Krishnan, Fabian Monrose and Niels Provos. ShellOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks. In proceedings of the 20th USENIX Security Symposium, San Francisco, Aug. 2011. (PDF)


◦Srinivas Krishnan, Kevin Snow and  Fabian Monrose. Trail of Bytes: Efficient Support for Forensic Analysis. To appear in Proceedings of the ACM Conference on Computer and Communication Security, Chicago, 2010. (PDF)


         See the journal version of this paper, entitled, Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches, In IEEE Transactions on Information Forensics and Security, Dec. 2012. (PDF).


◦Srinivas Krishnan and  Fabian Monrose. Secure Recording of Accesses to a  Protected Datastore. In Proceedings of the ACM Workshop on Virtual Machine Security, Chicago, 2009 (PDF).