N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium 114, 114, 2006 | 474 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 360* | 2012 |
Fast searches for effective optimization phase sequences P Kulkarni, S Hines, J Hiser, D Whalley, J Davidson, D Jones ACM SIGPLAN Notices 39 (6), 171-182, 2004 | 172 | 2004 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 170 | 2006 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 119 | 2009 |
Addressing the challenges of DBT for the ARM architecture RW Moore, JA Baiocchi, BR Childers, JW Davidson, JD Hiser Acm sigplan notices 44 (7), 147-156, 2009 | 97 | 2009 |
Evaluating indirect branch handling mechanisms in software dynamic translation systems JD Hiser, D Williams, W Hu, JW Davidson, J Mars, BR Childers International Symposium on Code Generation and Optimization (CGO'07), 61-73, 2007 | 96 | 2007 |
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks 30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021 | 70 | 2021 |
Vista: a system for interactive code improvement W Zhao, B Cai, D Whalley, MW Bailey, R Van Engelen, X Yuan, JD Hiser, ... ACM SIGPLAN Notices 37 (7), 155-164, 2002 | 57 | 2002 |
Fast and efficient searches for effective optimization-phase sequences PA Kulkarni, SR Hines, DB Whalley, JD Hiser, JW Davidson, DL Jones ACM Transactions on Architecture and Code Optimization (TACO) 2 (2), 165-198, 2005 | 56 | 2005 |
System, method and computer readable medium for software protection via composable process-level virtual machines S Ghosh, JD Hiser, JW Davidson US Patent 11,042,631, 2021 | 47 | 2021 |
A secure and robust approach to software tamper resistance S Ghosh, JD Hiser, JW Davidson International Workshop on Information Hiding, 33-47, 2010 | 44 | 2010 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 41 | 2009 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 39 | 2017 |
System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms JW Davidson, JD Hiser US Patent App. 12/809,627, 2011 | 39 | 2011 |
Embarc: an efficient memory bank assignment algorithm for retargetable compilers JD Hiser, JW Davidson Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004 | 37 | 2004 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 36 | 2017 |
Evaluating fragment construction policies for SDT systems JD Hiser, D Williams, A Filipi, JW Davidson, BR Childers Proceedings of the 2nd international conference on Virtual execution …, 2006 | 35 | 2006 |
Replacement attacks against vm-protected applications S Ghosh, J Hiser, JW Davidson Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 33 | 2012 |
Same coverage, less bloat: Accelerating binary-only fuzzing with coverage-preserving coverage-guided tracing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 32 | 2021 |