Follow
Yves Younan
Yves Younan
Cisco Talos
Verified email at fort-knox.org - Homepage
Title
Cited by
Cited by
Year
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
2292009
RIPE: Runtime intrusion prevention evaluator
J Wilander, N Nikiforakis, Y Younan, M Kamkar, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference, 41-50, 2011
1722011
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
Y Younan
NDSS, 2015
1562015
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
Engineering Secure Software and Systems: Third International Symposium …, 2011
1402011
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1352010
Code injection in C and C++: A survey of vulnerabilities and countermeasures
Y Younan, W Joosen, F Piessens
Technical Report CW386, Departement Computerwetenschappen, Katholieke …, 2004
1022004
Runtime countermeasures for code injection attacks against C and C++ programs
Y Younan, W Joosen, F Piessens
ACM Computing Surveys (CSUR) 44 (3), 1-28, 2012
832012
Extended protection against stack smashing attacks without performance loss
Y Younan, D Pozza, F Piessens, W Joosen
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 429-438, 2006
652006
25 years of vulnerabilities: 1988-2012
Y Younan
Sourcefire vulnerability research team, 2013
632013
Low-level software security by example
Ú Erlingsson, Y Younan, F Piessens
Handbook of Information and Communication Security, 633-658, 2010
572010
Efficient protection against heap-based buffer overflows without resorting to magic
Y Younan, W Joosen, F Piessens
Information and Communications Security: 8th International Conference, ICICS …, 2006
512006
Bubble: A javascript engine level countermeasure against heap-spraying attacks
F Gadaleta, Y Younan, W Joosen
Engineering Secure Software and Systems: Second International Symposium …, 2010
502010
HProxy: Client-side detection of SSL stripping attacks
N Nikiforakis, Y Younan, W Joosen
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
462010
A methodology for designing countermeasures against current and future code injection attacks
Y Younan, W Joosen, F Piessens
Third IEEE International Workshop on Information Assurance (IWIA'05), 3-20, 2005
422005
An overview of common programming security vulnerabilities and possible solutions
Y Younan, V Tenebras, DY Younan, D Vermeir
422003
Jitsec: Just-in-time security for code injection attacks
W De Groef, N Nikiforakis, Y Younan, F Piessens
Benelux Workshop on Information and System Security (WISSEC 2010), 1-15, 2010
312010
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
312010
Code pointer masking: Hardening applications against code injection attacks
P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter
International Conference on Detection of Intrusions and Malware, and …, 2011
262011
Filter-resistant code injection on ARM
Y Younan, P Philippaerts, F Piessens, W Joosen, S Lachmund, T Walter
Proceedings of the 16th ACM conference on Computer and communications …, 2009
242009
Security of memory allocators for C and C++
Y Younan, W Joosen, F Piessens, HV den Eynden
Technical Report CW 419, Department of Computer Science, Katholieke …, 2005
232005
The system can't perform the operation now. Try again later.
Articles 1–20