Sebastian Österlund
Title
Cited by
Cited by
Year
RIDL: Rogue In-flight Data Load
S van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
S&P, 2019
1412019
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution
S Österlund, P Koning, K. Olivier, A Barbalace, H Bos, C and Giuffrida
ASPLOS, 2019
172019
ParmeSan: Sanitizer-guided Greybox Fuzzing
S Österlund, K Razavi, H Bos, C Giuffrida
29th USENIX Security Symposium (USENIX Security 20), 2020
142020
Addendum to RIDL: Rogue in-flight data load
S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ...
Addendum, 2019
42019
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing
E Güler, P Görz, E Geretto, A Jemmett, S Österlund, H Bos, C Giuffrida, ...
Annual Computer Security Applications Conference, 360-372, 2020
12020
CollabFuzz: A Framework for Collaborative Fuzzing
S Österlund, E Geretto, A Jemmett, E Güler, P Görz, T Holz, C Giuffrida, ...
Proceedings of the 14th European Workshop on Systems Security, 1-7, 2021
2021
Who’s debugging the debuggers? exposing debug information bugs in optimized binaries
GA Di Luna, D Italiano, L Massarelli, S Österlund, C Giuffrida, L Querzoni
Proceedings of the 26th ACM International Conference on Architectural …, 2021
2021
Detecting information leaks using kernel-level multi-variant execution
S Österlund
Vrije Universiteit Amsterdam, 2017
2017
Strengthening diversification defenses by means of a non-readable code segment
S Österlund
VU University Amsterdam, 2015
2015
Strengthening diversification defenses by means of a non-readable code segment
S Österlund
Vrije Universiteit Amsterdam, 2015
2015
Who’s Debugging the Debuggers?
GA Di Luna, D Italiano, L Massarelli, S Österlund, C Giuffrida, L Querzoni
The system can't perform the operation now. Try again later.
Articles 1–11