default search action
David Gens
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]Min-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz:
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing. ESEC/SIGSOFT FSE 2023: 821-831 - 2022
- [c18]Paul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
PKRU-safe: automatically locking down the heap between safe and unsafe languages. EuroSys 2022: 132-148 - [i6]Min-Yih Hsu, David Gens, Michael Franz:
MCAD: Beyond Basic-Block Throughput Estimation Through Differential, Instruction-Level Tracing. CoRR abs/2201.04804 (2022) - 2021
- [c17]Chinmay Deshpande, David Gens, Michael Franz:
StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries. AISec@CCS 2021: 85-95 - 2020
- [c16]Prabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks. AsiaCCS 2020: 494-505 - [c15]Anil Altinay, Joseph Nash, Taddeus Kroes, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Cristiano Giuffrida, Herbert Bos, Michael Franz:
BinRec: dynamic binary lifting and recompilation. EuroSys 2020: 36:1-36:16 - [c14]Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
NoJITsu: Locking Down JavaScript Engines. NDSS 2020 - [c13]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. USENIX Security Symposium 2020: 1445-1461
2010 – 2019
- 2019
- [b1]David Gens:
OS-level Attacks and Defenses: from Software to Hardware-based Exploits. Darmstadt University of Technology, Germany, 2019 - [c12]Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. AsiaCCS 2019: 561-572 - [c11]Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. NDSS 2019 - [c10]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
HardFails: Insights into Software-Exploitable Hardware Bugs. USENIX Security Symposium 2019: 213-230 - [c9]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. USENIX Security Symposium 2019: 801-818 - [i5]Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, Ahmad-Reza Sadeghi:
V0LTpwn: Attacking x86 Processor Integrity from Software. CoRR abs/1912.04870 (2019) - [i4]Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi:
FastKitten: Practical Smart Contracts on Bitcoin. IACR Cryptol. ePrint Arch. 2019: 154 (2019) - 2018
- [c8]Shaza Zeitouni, David Gens, Ahmad-Reza Sadeghi:
It's hammer time: how to attack (rowhammer-based) DRAM-PUFs. DAC 2018: 65:1-65:6 - [c7]David Gens:
OS-level Software & Hardware Attacks and Defenses. PhD Forum@MobiSys 2018: 7-8 - [c6]David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi:
K-Miner: Uncovering Memory Corruption in Linux. NDSS 2018 - [i3]Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun K. Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs. CoRR abs/1812.00197 (2018) - 2017
- [c5]Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
JITGuard: Hardening Just-in-time Compilers with SGX. CCS 2017: 2405-2419 - [c4]Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. NDSS 2017 - [c3]David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. RAID 2017: 238-258 - [c2]Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. USENIX Security Symposium 2017: 117-130 - [i2]Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin:
Execution Integrity with In-Place Encryption. CoRR abs/1703.02698 (2017) - 2016
- [i1]Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks. CoRR abs/1611.08396 (2016) - 2015
- [c1]Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. ACISP 2015: 413-430
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint