Cache attacks on Intel SGX J Götzfried, M Eckert, S Schinzel, T Müller Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 530 | 2017 |
Heaphopper: bringing bounded model checking to heap implementation security M Eckert, A Bianchi, R Wang, Y Shoshitaishvili, C Kruegel, G Vigna 27th {USENIX} Security Symposium ({USENIX} Security 18), 99-116, 2018 | 81 | 2018 |
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs J Vadayath, M Eckert, K Zeng, N Weideman, GP Menon, Y Fratantonio, ... 31st USENIX Security Symposium (USENIX Security 22), 413-430, 2022 | 28 | 2022 |
Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern Z Benenson, F Berger, A Cherepantsev, S Datsevich, L Do, M Eckert, ... | 6 | 2019 |