László Szekeres
László Szekeres
Email verificata su google.com - Home page
Titolo
Citata da
Citata da
Anno
Sok: Eternal war in memory
L Szekeres, M Payer, T Wei, D Song
2013 IEEE Symposium on Security and Privacy, 48-62, 2013
5652013
Practical control flow integrity and randomization for binary executables
C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ...
2013 IEEE Symposium on Security and Privacy, 559-573, 2013
4912013
Code-pointer integrity
V Kuznetzov, L Szekeres, M Payer, G Candea, R Sekar, D Song
The Continuing Arms Race: Code-Reuse Attacks and Defenses, 81-116, 2018
4202018
Eternal war in memory
L Szekeres, M Payer, T Wei, R Sekar
IEEE security & privacy 12 (3), 45-53, 2014
282014
Transformation-aware exploit generation using a HI-CFG
D Caselden, A Bazhanyuk, M Payer, L Szekeres, S McCamant, D Song
CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2013
242013
Poster: Getting the point (er): On the feasibility of attacks on code-pointer integrity
V Kuznetsov, L Szekeres, M Payer, G Candea, D Song
IEEE Symposium on Security and Privacy, 2015
192015
Protecting function pointers in binary
C Zhang, T Wei, Z Chen, L Duan, S McCamant, L Szekeres
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
172013
Testing applications with a defined input format
F Ivancic, L Szekeres, D Babic
US Patent 9,977,729, 2018
102018
FUDGE: Fuzz Driver Generation at Scale
D Babic, S Bucur, Y Chen, F Ivancic, T King, M Kusano, C Lemieux, ...
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
82019
Memory corruption mitigation via hardening and testing
L Szekeres
Ph. D. Dissertation. Stony Brook University, 2017
62017
Fpgate: The last building block for a practical cfi solution
T Wei, C Zhang, Z Chen, L Duan, L Szekeres, S McCamant, D Song
technical report for microsoft bluehat prize contest. Tech. rep, 2012
12012
Testing applications with a defined input format
F Ivancic, L Szekeres, D Babic
US Patent 10,095,610, 2018
2018
Software security (Szoftverbiztonság)
L Szekeres, G Tóth
Infocommunications Journal (Híradástechnika) 63 (11), 3-9, 2008
2008
Il sistema al momento non puň eseguire l'operazione. Riprova piů tardi.
Articoli 1–13