Dennis Andriesse
Dennis Andriesse
Offensive Security Researcher at Intel
Verified email at few.vu.nl - Homepage
Title
Cited by
Cited by
Year
Sok: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P'13), 97-111, 2013
1802013
Practical Context-Sensitive CFI
D Andriesse, V van der Veen, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd Conference on Computer and Communications Security …, 2015
160*2015
Highly Resilient Peer-to-Peer Botnets Are Here: An Analysis of Gameover Zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
Proceedings of the 8th International Conference on Malicious and Unwanted …, 2013
1082013
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
Proceedings of the Network and Distributed System Security Symposium (NDSS'15), 2015
782015
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
D Andriesse, X Chen, V van der Veen, A Slowinska, H Bos
Proceedings of the 25th USENIX Security Symposium (USENIX Sec'16), 2016
642016
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later
V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ...
Proceedings of the 24th Conference on Computer and Communications Security, 2017
432017
Compiler-Agnostic Function Detection in Binaries
D Andriesse, A Slowinska, H Bos
Proceedings of the 2nd IEEE European Symposium on Security and Privacy …, 2017
412017
Reliable Recon in Adversarial Peer-to-Peer Botnets
D Andriesse, C Rossow, H Bos
Proceedings of the 15th Internet Measurement Conference (IMC'15), 2015
232015
An Analysis of the Zeus Peer-to-Peer Protocol
D Andriesse, H Bos
Technical Report, VU University Amsterdam, 2013
192013
Instruction-Level Steganography for Covert Trigger-Based Malware
D Andriesse, H Bos
Proceedings of the 11th Conference on Detection of Intrusions and Malware …, 2014
172014
Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming
D Andriesse, H Bos, A Slowinska
Proceedings of the 45th Conference on Dependable Systems and Networks (DSN'15), 2015
162015
Zebram: Comprehensive and compatible software protection against rowhammer attacks
RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi
13th {USENIX} Symposium on Operating Systems Design and Implementation …, 2018
92018
Benchmarking Crimes: An Emerging Threat in Systems Security
E van der Kouwe, D Andriesse, H Bos, C Giuffrida, G Heiser
Preprint (https://arxiv.org/pdf/1801.02381.pdf), 2018
72018
NetCAT: Practical Cache Attacks from the Network
M Kurth, B Gras, D Andriesse, C Giuffrida, H Bos, K Razavi
S&P, 2020
22020
SoK: Benchmarking flaws in systems security
E van der Kouwe, G Heiser, D Andriesse, H Bos, C Giuffrida
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 310-325, 2019
22019
Analyzing and securing binaries through static disassembly
D Andriesse
PhD thesis (Vrije Universiteit Amsterdam), 2017
22017
Now you see me: Real-time dynamic function call detection
F De Goër, S Rawat, D Andriesse, H Bos, R Groz
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
12018
Benchmarking Flaws Undermine Security Research
E van der Kouwe, G Heiser, D Andriesse, H Bos, C Giuffrida
IEEE Security & Privacy, 2020
2020
Computing device with increased resistance against rowhammer attacks
RK Konoth, A Tatar, M Oliverio, D Andriesse, HJ Bos, C Giuffrida, ...
US Patent App. 16/059,357, 2020
2020
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching
A Pawlowski, V van der Veen, D Andriesse, E van der Kouwe, T Holz, ...
Proceedings of the 35th Annual Computer Security Applications Conference, 97-112, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20