Follow
Enes Göktaş
Enes Göktaş
Security Researcher, Apple
Verified email at apple.com
Title
Cited by
Cited by
Year
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
5792014
Practical Context-Sensitive CFI
V van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3482015
A tough call: Mitigating advanced code-reuse attacks at the binary level
V van der Veen, E Göktas, M Contag, A Pawlowski, X Chen, S Rawat, ...
IEEE Symposium on Security and Privacy (S&P), 2016
2692016
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd USENIX Security Symposium, San Diego, CA, 417-432, 2014
2202014
Undermining Information Hiding (And What to do About it)
E Göktas, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
USENIX Security 16, 2016
108*2016
ShrinkWrap: VTable Protection without Loose Ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
642015
Speculative Probing: Hacking Blind in the Spectre Era
E Göktaş, K Razavi, G Portokalidis, H Bos, C Giuffrida
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
572020
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
E Göktas, B Kollenda, P Koppe, E Bosman, G Portokalidis, T Holz, H Bos, ...
3rd IEEE European Symposium on Security and Privacy, 2018
562018
Towards automated discovery of crash-resistant primitives in binary executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
172017
Bypassing clang’s SafeStack for Fun and Profit
E Göktaş, A Economopoulos, R Gawlik, E Athanasopoulos, G Portokalidis, ...
Black Hat Europe, 21, 2016
162016
Evaluating Control-Flow Restricting Defenses
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
The Continuing Arms Race, 117-137, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–11