Herbert Bos
#170,311
Most Influential Person Now
Researcher
Herbert Bos's AcademicInfluence.com Rankings
Herbert Boscriminal-justice Degrees
Criminal Justice
#217
World Rank
#243
Historical Rank
Cyber Security
#25
World Rank
#27
Historical Rank
Herbert Boscomputer-science Degrees
Computer Science
#10410
World Rank
#10933
Historical Rank
Cybersecurity
#25
World Rank
#27
Historical Rank
Database
#7403
World Rank
#7672
Historical Rank
Download Badge
Criminal Justice Computer Science
Why Is Herbert Bos Influential?
(Suggest an Edit or Addition)Herbert Bos's Published Works
Published Works
- VUzzer: Application-aware Evolutionary Fuzzing (2017) (519)
- Paranoid Android: versatile protection for smartphones (2010) (400)
- Out of Control: Overcoming Control-Flow Integrity (2014) (389)
- Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation (2006) (335)
- Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (2016) (260)
- RIDL: Rogue In-Flight Data Load (2019) (238)
- Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations (2013) (229)
- Prudent Practices for Designing Malware Experiments: Status Quo and Outlook (2012) (226)
- Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks (2018) (204)
- ASLR on the Line: Practical Cache Attacks on the MMU (2017) (202)
- Practical Context-Sensitive CFI (2015) (193)
- Flip Feng Shui: Hammering a Needle in the Software Stack (2016) (186)
- Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector (2016) (182)
- SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013) (182)
- A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level (2016) (176)
- Howard: A Dynamic Excavator for Reverse Engineering Data Structures (2011) (174)
- Can we make operating systems reliable and secure? (2006) (173)
- Memory Errors: The Past, the Present, and the Future (2012) (159)
- Pointless tainting?: evaluating the practicality of pointer tainting (2009) (157)
- MINIX 3: a highly reliable, self-repairing operating system (2006) (155)
- Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard (2014) (145)
- On Botnets That Use DNS for Command and Control (2011) (136)
- Minemu: The World's Fastest Taint Tracker (2011) (129)
- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics (2014) (128)
- An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries (2016) (120)
- No Need to Hide: Protecting Safe Regions on Commodity Hardware (2017) (115)
- MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense (2018) (112)
- FFPF: Fairly Fast Packet Filters (2004) (109)
- Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus (2013) (106)
- TRRespass: Exploiting the Many Sides of Target Row Refresh (2020) (101)
- Failure Resilience for Device Drivers (2007) (100)
- Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU (2018) (97)
- Sandnet: network traffic analysis of malicious software (2011) (96)
- Throwhammer: Rowhammer Attacks over the Network and Defenses (2018) (96)
- StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries (2015) (95)
- Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks (2019) (91)
- Framing Signals - A Return to Portable Shellcode (2014) (89)
- Compiler-Agnostic Function Detection in Binaries (2017) (85)
- IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming (2016) (81)
- Poking Holes in Information Hiding (2016) (80)
- SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots (2007) (74)
- Large-Scale Analysis of Malware Downloaders (2012) (73)
- Construction of a Highly Dependable Operating System (2006) (71)
- Undermining Information Hiding (and What to Do about It) (2016) (71)
- TypeSan: Practical Type Confusion Detection (2016) (70)
- CrossTalk: Speculative Data Leaks Across Cores Are Real (2021) (68)
- Fault isolation for device drivers (2009) (68)
- The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later (2017) (65)
- ParmeSan: Sanitizer-guided Greybox Fuzzing (2020) (65)
- Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization (2016) (61)
- File size distribution on UNIX systems: then and now (2006) (59)
- ShrinkWrap: VTable Protection without Loose Ends (2015) (58)
- Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation (2012) (55)
- GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM (2018) (55)
- CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks (2017) (53)
- The BORG: Nanoprobing Binaries for Buffer Overreads (2015) (51)
- SafeCard: A Gigabit IPS on the Network Card (2006) (50)
- Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer (2018) (49)
- How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication (2016) (46)
- ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks (2018) (45)
- Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation (2014) (44)
- Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card (2005) (42)
- Dynamic Analysis of Android Malware (2013) (41)
- TIFF: Using Input Type Inference To Improve Fuzzing (2018) (40)
- MARX: Uncovering Class Hierarchies in C++ Programs (2017) (40)
- Delta pointers: buffer overflow checks without the checks (2018) (40)
- Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think (2018) (39)
- : Practical Cache Attacks from the Network (2020) (37)
- Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure (2018) (37)
- ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures (2020) (37)
- On measuring the impact of DDoS botnets (2014) (36)
- SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript (2021) (35)
- Reorganizing UNIX for Reliability (2006) (35)
- Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities (2017) (33)
- Who allocated my memory? Detecting custom memory allocators in C binaries (2013) (32)
- P 2 PWNED : Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (2013) (29)
- Keep net working - on a dependable and fast networking stack (2012) (27)
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution (2019) (27)
- PIE: Parser Identification in Embedded Systems (2015) (26)
- The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack (2007) (26)
- Reliable Recon in Adversarial Peer-to-Peer Botnets (2015) (25)
- When Slower Is Faster: On Heterogeneous Multicores for Reliable Systems (2013) (25)
- Research in Attacks, Intrusions, and Defenses (2015) (25)
- Speculative Probing: Hacking Blind in the Spectre Era (2020) (24)
- MemPick: High-level data structure detection in C/C++ binaries (2013) (23)
- Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks (2021) (23)
- Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming (2015) (23)
- Benchmarking Crimes: An Emerging Threat in Systems Security (2018) (22)
- Eudaemon: involuntary and on-demand emulation against zero-day exploits (2008) (22)
- On Sockets and System Calls: Minimizing Context Switches for the Socket API (2014) (21)
- SCAMPI: A Scalable and Programmable Architecture for Monitoring Gigabit Networks (2003) (21)
- Application-Tailored I/O with Streamline (2011) (20)
- Lightweight Memory Checkpointing (2015) (20)
- Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract) (2014) (20)
- METAlloc: efficient and comprehensive metadata management for software security hardening (2016) (20)
- An Analysis of the Zeus Peer-to-Peer Protocol (2014) (19)
- Beltway Buffers: Avoiding the OS Traffic Jam (2008) (18)
- BinRec: dynamic binary lifting and recompilation (2020) (18)
- Dowser: a guided fuzzer to find buffer overflow vulnerabilities (2013) (17)
- Modern operating systems 4th edition (2015) (17)
- Ruler: high-speed packet matching and rewriting on NPUs (2007) (16)
- On the detection of custom memory allocators in C binaries (2016) (16)
- SoK: Benchmarking Flaws in Systems Security (2019) (16)
- FPL-3: Towards Language Support for Distributed Packet Processing (2005) (16)
- Scalable network monitors for high-speed links: a bottom-up approach (2004) (16)
- RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches (2017) (16)
- Mapping and Synchronizing Streaming Applications on Cell Processors (2008) (16)
- BinRec: Attack Surface Reduction Through Dynamic Binary Recovery (2018) (15)
- Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities (2013) (15)
- Decoupling Provenance Capture and Analysis from Execution (2015) (15)
- DDE: dynamic data structure excavation (2010) (14)
- PipesFS: fast Linux I/O in the unix tradition (2008) (14)
- System-Level Support for Intrusion Recovery (2012) (14)
- Modular System Programming in MINIX 3 (2006) (14)
- Trade-Offs in Automatic Provenance Capture (2016) (13)
- Scalable data structure detection and classification for C/C++ binaries (2016) (13)
- Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables (2017) (13)
- TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs (2020) (13)
- Paranoid Android : Zero-Day Protection for Smartphones Using the Cloud (2010) (12)
- The OKE Corral: Code Organisation and Reconfiguration at Runtime Using Active Linking (2002) (12)
- The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts (2007) (12)
- A network intrusion detection system on IXP1200 network processors with support for large rule sets (2004) (12)
- Towards Automated Vulnerability Scanning of Network Servers (2018) (12)
- The Red Book - The SysSec Roadmap for Systems Security Research (2013) (12)
- Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks (2022) (11)
- Speculative Memory Checkpointing (2015) (11)
- Fast and Generic Metadata Management with Mid-Fat Pointers (2017) (11)
- ConFuzz—A Concurrency Fuzzer (2019) (10)
- Bypassing Clang's SafeStack for Fun and Profit (2016) (10)
- Slick: an intrusion detection system for virtualized storage devices (2016) (10)
- Proceedings of the Ninth European Conference on Computer Systems (2014) (10)
- Secure Page Fusion with VUsion: https://www.vusec.net/projects/VUsion (2017) (10)
- Model-T: Rethinking the OS for terabit speeds (2008) (10)
- "Nice Boots!" - A Large-Scale Analysis of Bootkits and New Ways to Stop Them (2015) (10)
- FPL-3E: Towards Language Support for Reconfigurable Packet Processing (2005) (10)
- Type-After-Type: Practical and Complete Type-Safe Memory Reuse (2018) (9)
- DSIbin: Identifying dynamic data structures in C/C++ binaries (2017) (9)
- WORLDWIDE OBSERVATORY OF MALICIOUS BEHAVIORS AND ATTACK THREATS (2013) (9)
- Application-specific policies: beyond the domain boundaries (1999) (9)
- Modern Operating Systems 4/e (2015) (9)
- Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing (2020) (9)
- Future threats to future trust (2009) (9)
- SP@CE - An SP-Based Programming Model for Consumer Electronics Streaming Applications (2006) (8)
- CollabFuzz: A Framework for Collaborative Fuzzing (2021) (8)
- Off-the-shelf Embedded Devices as Platforms for Security Research (2017) (8)
- MemPick: A tool for data structure detection (2013) (8)
- JTR: A Binary Solution for Switch-Case Recovery (2017) (8)
- Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability) (2008) (8)
- Can We Make Operating Systems Reliable and (2006) (7)
- TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering (2022) (7)
- Techniques for efficient in-memory checkpointing (2013) (7)
- OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems (2016) (7)
- Elastic network control: An alternative to active networks (2001) (7)
- Pointer tainting still pointless: (but we all see the point of tainting) (2010) (7)
- ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations (2019) (6)
- Addendum 2 to RIDL: Rogue In-flight Data Load (2020) (6)
- Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting (2009) (6)
- Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging (2016) (6)
- PROV2R: Practical Provenance Analysis of Unstructured Processes (2017) (6)
- Software that Meets Its Intent (2016) (6)
- On the Feasibility of Using Network Processors for DNA Queries (2005) (6)
- Supporting Reconfigurable Parallel Multimedia Applications (2006) (6)
- Roadmap to a Failure-Resilient Operating System (2007) (6)
- Malicious cryptocurrency miners: Status and Outlook (2019) (6)
- Anticipating Security Threats to a Future Internet (2009) (5)
- Now You See Me: Real-time Dynamic Function Call Detection (2018) (5)
- Techniques for efficient in-memory checkpointing (2014) (5)
- Dynamic data structure excavation (2010) (5)
- SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions (2020) (5)
- Robust distributed systems achieving self-management through inference (2005) (5)
- Prospector: Accurate Analysis of Heap and Stack Overflows by Means of Age Stamps (2007) (5)
- MemBrush: A practical tool to detect custom memory allocators in C binaries (2013) (5)
- Multi-tier intrusion detection by means of replayable virtual machines (2008) (5)
- Countering IPC Threats in Multiserver Operating Systems (2008) (5)
- Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables) (2014) (5)
- Safe execution of untrusted applications on embedded network processors (2008) (5)
- A Component-based Coordination Language for Efficient Reconfigurable Streaming Applications (2007) (4)
- Proceedings of the 7th ACM european conference on Computer Systems (2012) (4)
- The Red Book (2013) (4)
- A NEaT Design for Reliable and Scalable Network Stacks (2016) (4)
- Packet monitoring at high speed with FFPF ( Technical Report ) (4)
- LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating (2021) (4)
- VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching (2019) (4)
- Protecting smart phones by means of execution replication (2010) (4)
- PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination (2021) (4)
- Ruler: easy packet matching and rewriting on network processors (2007) (3)
- Network Traffic Analysis of Malicious Software (2011) (3)
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel (2022) (3)
- HOKES/POKES: Lightweight resource sharing (2003) (3)
- A compiler for Packet Filters (3)
- Open Extensible Network Control (2000) (3)
- Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment (2011) (3)
- Benchmarking Flaws Undermine Security Research (2020) (3)
- Lessons learned in developing a flexible packet processor for high-speed links (2005) (3)
- Systems Security at VU University Amsterdam (2011) (2)
- Facilitating Trust on Data through Provenance (2014) (2)
- Research in attacks, intrusions and defenses : 17th international symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, proceedings (2014) (2)
- Efficient reservations in open ATM network control using on-line measurements (1998) (2)
- Towards Flexible Real-Time Network Monitoring Using a Network Processor (2002) (2)
- Eudaemon: A Good Spirit to Protect Processes from Internet Attacks (2007) (2)
- PROV2R (2017) (2)
- SysSec: Managing Threats and Vulnerabilities in the Future Internet (2012) (2)
- MINIX 3: Status Report and Current Research (2010) (2)
- ProbeGuard (2019) (2)
- Binary Rejuvenation: Applications and Challenges (2016) (2)
- FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection (2021) (2)
- BinRec (2020) (2)
- Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings (2011) (2)
- Network Processor Design, Issues and Practices, Vol.3 (2004) (2)
- The Architecture of a Reliable Operating System (2006) (2)
- Ruler : high-speed traffic classification and rewriting using regular expressions – Technical Report – (2006) (2)
- Over the Edge: Silently Owning Windows 10's Secure Browser (2016) (1)
- Splash: SNMP Plus a Lightweight API for SNAP Handling (2004) (1)
- Streamline : Efficient OS Communication Through Versatile Streams (2007) (1)
- Use of Heterogeneous Multicore Architectures in Reliable Multiserver Systems (2012) (1)
- HOKES/POKES: Light-Weight Resource Sharing (2003) (1)
- PANDAcap: a framework for streamlining collection of full-system traces (2020) (1)
- A perspective on how ATM lost control (2002) (1)
- ◄◄ Rewind. (1998) (1)
- Isolating Operating System Extensions in User-mode Processes (2008) (1)
- Elastic network control (2000) (1)
- Towards Optimal Scheduling of Multiserver System Components (2014) (1)
- SNMP Plus a Lightweight API for SNAP Handling (SPLASH) (2004) (1)
- On the effectiveness of same-domain memory deduplication (2022) (1)
- Forward White Book: Emerging ICT Threats (2010) (1)
- kMVX (2019) (1)
- Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404 (2015) (1)
- POSTER: Identifying Dynamic Data Structures in Malware (2016) (1)
- DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels (2022) (1)
- MemPick: data structure detection in C/C++ binaries (2013) (1)
- Network intrusion prevention on the network card (2005) (1)
- PANDAcap (2020) (0)
- CollabFuzz (0)
- Flip Feng Shui: Rowhammering the VM's Isolation (2016) (0)
- Measurements on forage blowers. (1958) (0)
- DangZero (2022) (0)
- DangZero: Efficient Use-After-Free Detection via Direct Page Table Access (2022) (0)
- A network intrusion detection system on IXP 1200 network processors with support for large rule sets ( Technical Report 2004-02 ) (2004) (0)
- Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots (2022) (0)
- European Commission-Horizon 2020 DS-07-2017 Cybersecurity PPP: Addressing Advanced Cyber Security Threats and Threat Actors (2019) (0)
- FORWARD Threat Report (2009) (0)
- Techniques and applications (1975) (0)
- Elastic Networks Active Networks Open Control Networks (2007) (0)
- Evaluation of current state of amplification-based DDoS attacks (2018) (0)
- Scalable data structure detection and classification for C/C++ binaries (2015) (0)
- Eecient Reservations in Open Atm Network Control Using Online Measurements (1998) (0)
- On the detection of custom memory allocators in C binaries (2015) (0)
- Newton Gadgets Static Analysis Constraint Managers Target Constraints Write Constraints Binary + Libraries Dynamic Analysis (2017) (0)
- An IPC model for extended asymmetric trust (2007) (0)
- Howard: Excavating Data Structures from Stripped Binaries (2012) (0)
- Argos : emulated hardware support to fingerprint zero-day attacks by means of dynamic data flow analysis (2006) (0)
- Erratum to: Trade-Offs in Automatic Provenance Capture (2016) (0)
- On the Effectiveness of Code Normalization for Function Identification (2018) (0)
- CacheCard: caching static and dynamic content on the NIC (2009) (0)
- Evaluating control-flow restricting defenses (2018) (0)
- Seventh Framework Programme Information & Communication Technologies Secure, Dependable and Trusted Infrastructures Coordination Action Managing Emerging Threats in Ict Infrastructures Deliverable D2.1.x Threat Reports Deliverable Security Class Public Editors Working Group Leaders Contributors Forw (0)
- Dynamically extending the Corral with native code for high-speed packet processing (2006) (0)
- Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks (2023) (0)
- Using Beltway Buffers for efficient and structured I/O (2006) (0)
- VPS (2019) (0)
- PANDAcap SSH Honeypot Dataset (2020) (0)
- CacheCard: a tran sparent cache for static and dynamic content on the NIC (2009) (0)
- Roadmap to a faillure-resilient operating sistem (2007) (0)
- Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008 (2008) (0)
- Visualization of hierarchical data (2005) (0)
- Assistant Professor (1995) (0)
- Table of contents (2005) (0)
- Scheduling of Multiserver System Components on Over-provisioned Multicore Systems (2014) (0)
- The Design and Implementation of a Fully-Modular , Self-Healing , UNIX-Like Operating System (2006) (0)
- Application-specic Policies: beyond the Domain Boundaries 1.1 Contribution (1999) (0)
- Heterogeneous Multicores : When Slower is Faster (2013) (0)
- Brief announcement: a shared disk on distributed storage (2010) (0)
- Norrie's disease. (1976) (0)
- OS support for multi-gigabit networking (2005) (0)
- FORWARD -- Second Workshop Report (2009) (0)
This paper list is powered by the following services:
Other Resources About Herbert Bos
What Schools Are Affiliated With Herbert Bos?
Herbert Bos is affiliated with the following schools: