ติดตาม
Yves Younan
Yves Younan
Cisco Talos
ยืนยันอีเมลแล้วที่ fort-knox.org - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
2312009
RIPE: Runtime intrusion prevention evaluator
J Wilander, N Nikiforakis, Y Younan, M Kamkar, W Joosen
Proceedings of the 27th Annual Computer Security Applications Conference, 41-50, 2011
1742011
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
Y Younan
NDSS, 2015
1562015
SessionShield: Lightweight protection against session hijacking
N Nikiforakis, W Meert, Y Younan, M Johns, W Joosen
Engineering Secure Software and Systems: Third International Symposium …, 2011
1422011
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1392010
Code injection in C and C++: A survey of vulnerabilities and countermeasures
Y Younan, W Joosen, F Piessens
Technical Report CW386, Departement Computerwetenschappen, Katholieke …, 2004
105*2004
Runtime countermeasures for code injection attacks against C and C++ programs
Y Younan, W Joosen, F Piessens
ACM Computing Surveys (CSUR) 44 (3), 1-28, 2012
892012
Extended protection against stack smashing attacks without performance loss
Y Younan, D Pozza, F Piessens, W Joosen
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 429-438, 2006
662006
25 years of vulnerabilities: 1988-2012
Y Younan
Sourcefire vulnerability research team, 2013
652013
Low-level software security by example
Ú Erlingsson, Y Younan, F Piessens
Handbook of Information and Communication Security, 633-658, 2010
582010
Efficient protection against heap-based buffer overflows without resorting to magic
Y Younan, W Joosen, F Piessens
Information and Communications Security: 8th International Conference, ICICS …, 2006
512006
Bubble: A javascript engine level countermeasure against heap-spraying attacks
F Gadaleta, Y Younan, W Joosen
Engineering Secure Software and Systems: Second International Symposium …, 2010
502010
HProxy: Client-side detection of SSL stripping attacks
N Nikiforakis, Y Younan, W Joosen
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
482010
A methodology for designing countermeasures against current and future code injection attacks
Y Younan, W Joosen, F Piessens
Third IEEE International Workshop on Information Assurance (IWIA'05), 3-20, 2005
412005
An overview of common programming security vulnerabilities and possible solutions
Y Younan, V Tenebras, DY Younan, D Vermeir
412003
Jitsec: Just-in-time security for code injection attacks
W De Groef, N Nikiforakis, Y Younan, F Piessens
Benelux Workshop on Information and System Security (WISSEC 2010), 1-15, 2010
312010
ValueGuard: Protection of native applications against data-only buffer overflows
S Van Acker, N Nikiforakis, P Philippaerts, Y Younan, F Piessens
Information Systems Security: 6th International Conference, ICISS 2010 …, 2010
312010
Code pointer masking: Hardening applications against code injection attacks
P Philippaerts, Y Younan, S Muylle, F Piessens, S Lachmund, T Walter
International Conference on Detection of Intrusions and Malware, and …, 2011
272011
Filter-resistant code injection on ARM
Y Younan, P Philippaerts, F Piessens, W Joosen, S Lachmund, T Walter
Proceedings of the 16th ACM conference on Computer and communications …, 2009
242009
Security of memory allocators for C and C++
Y Younan, W Joosen, F Piessens, HV den Eynden
Technical Report CW 419, Department of Computer Science, Katholieke …, 2005
242005
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20