Breaking the memory secrecy assumption R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter Proceedings of the Second European Workshop on System Security, 1-8, 2009 | 229 | 2009 |
RIPE: Runtime intrusion prevention evaluator J Wilander, N Nikiforakis, Y Younan, M Kamkar, W Joosen Proceedings of the 27th Annual Computer Security Applications Conference, 41-50, 2011 | 172 | 2011 |
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. Y Younan NDSS, 2015 | 156 | 2015 |
SessionShield: Lightweight protection against session hijacking N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen Engineering Secure Software and Systems: Third International Symposium …, 2011 | 140 | 2011 |
PAriCheck: an efficient pointer arithmetic checker for C programs Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 135 | 2010 |
Code injection in C and C++: A survey of vulnerabilities and countermeasures Y Younan, W Joosen, F Piessens Technical Report CW386, Departement Computerwetenschappen, Katholieke …, 2004 | 102 | 2004 |
Runtime countermeasures for code injection attacks against C and C++ programs Y Younan, W Joosen, F Piessens ACM Computing Surveys (CSUR) 44 (3), 1-28, 2012 | 83 | 2012 |
Extended protection against stack smashing attacks without performance loss Y Younan, D Pozza, F Piessens, W Joosen 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 429-438, 2006 | 65 | 2006 |
25 years of vulnerabilities: 1988-2012 Y Younan Sourcefire vulnerability research team, 2013 | 63 | 2013 |
Low-level software security by example Ú Erlingsson, Y Younan, F Piessens Handbook of Information and Communication Security, 633-658, 2010 | 57 | 2010 |
Efficient protection against heap-based buffer overflows without resorting to magic Y Younan, W Joosen, F Piessens Information and Communications Security: 8th International Conference, ICICS …, 2006 | 51 | 2006 |
Bubble: A javascript engine level countermeasure against heap-spraying attacks F Gadaleta, Y Younan, W Joosen Engineering Secure Software and Systems: Second International Symposium …, 2010 | 50 | 2010 |
HProxy: Client-side detection of SSL stripping attacks N Nikiforakis, Y Younan, W Joosen Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 46 | 2010 |
A methodology for designing countermeasures against current and future code injection attacks Y Younan, W Joosen, F Piessens Third IEEE International Workshop on Information Assurance (IWIA'05), 3-20, 2005 | 42 | 2005 |
An overview of common programming security vulnerabilities and possible solutions Y Younan, V Tenebras, DY Younan, D Vermeir | 42 | 2003 |
Jitsec: Just-in-time security for code injection attacks W De Groef, N Nikiforakis, Y Younan, F Piessens Benelux Workshop on Information and System Security (WISSEC 2010), 1-15, 2010 | 31 | 2010 |
ValueGuard: Protection of native applications against data-only buffer overflows S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 31 | 2010 |
Code pointer masking: Hardening applications against code injection attacks P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter International Conference on Detection of Intrusions and Malware, and …, 2011 | 26 | 2011 |
Filter-resistant code injection on ARM Y Younan, P Philippaerts, F Piessens, W Joosen, S Lachmund, T Walter Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 24 | 2009 |
Security of memory allocators for C and C++ Y Younan, W Joosen, F Piessens, HV den Eynden Technical Report CW 419, Department of Computer Science, Katholieke …, 2005 | 23 | 2005 |