Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Erick Bauman
@inproceedings{DBLP:conf/raid/BaumanDHL23, author = {Erick Bauman and Jun Duan and Kevin W. Hamlen and Zhiqiang Lin}, title = {Renewable Just-In-Time Control-Flow Integrity}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {580--594}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607239}, doi = {10.1145/3607199.3607239}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hf/MarklinTBSLC22, author = {Richard W. Marklin and Ashley M. Toll and Erick Bauman and John J. Simmins and John F. LaDisa Jr. and Robert Cooper}, title = {Do Head-Mounted Augmented Reality Devices Affect Muscle Activity and Eye Strain of Utility Workers Who Do Procedural Work? Studies of Operators and Manhole Workers}, journal = {Hum. Factors}, volume = {64}, number = {2}, pages = {305--323}, year = {2022}, url = {https://doi.org/10.1177/0018720820943710}, doi = {10.1177/0018720820943710}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hf/MarklinTBSLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/HeBLYLLPHHZ20, author = {Xiaoyu He and Erick Bauman and Feng Li and Lei Yu and Linyu Li and Bingchang Liu and Aihua Piao and Kevin W. Hamlen and Wei Huo and Wei Zou}, editor = {Jingling Xue and Changhee Jung}, title = {Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing}, booktitle = {Proceedings of the 21st {ACM} {SIGPLAN/SIGBED} International Conference on Languages, Compilers, and Tools for Embedded Systems, {LCTES} 2020, London, UK, June 16, 2020}, pages = {74--84}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372799.3394363}, doi = {10.1145/3372799.3394363}, timestamp = {Sun, 14 Jun 2020 14:42:15 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/HeBLYLLPHHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/QuinonezGSBCL20, author = {Raul Quinonez and Jairo Giraldo and Luis E. Salazar and Erick Bauman and Alvaro A. C{\'{a}}rdenas and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{SAVIOR:} Securing Autonomous Vehicles with Robust Physical Invariants}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {895--912}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/quinonez}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/QuinonezGSBCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/AyoadeBKH19, author = {Gbadebo Ayoade and Erick Bauman and Latifur Khan and Kevin W. Hamlen}, title = {Smart Contract Defense through Bytecode Rewriting}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {384--389}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00059}, doi = {10.1109/BLOCKCHAIN.2019.00059}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/AyoadeBKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangBKLCZ19, author = {Huibo Wang and Erick Bauman and Vishal Karande and Zhiqiang Lin and Yueqiang Cheng and Yinqian Zhang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible Script Code Hardening Approach}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {114--121}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329848}, doi = {10.1145/3321705.3329848}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgo/BaumanWZL18, author = {Erick Bauman and Huibo Wang and Mingwei Zhang and Zhiqiang Lin}, editor = {Jens Knoop and Markus Schordan and Teresa Johnson and Michael F. P. O'Boyle}, title = {SGXElide: enabling enclave code secrecy via self-modification}, booktitle = {Proceedings of the 2018 International Symposium on Code Generation and Optimization, {CGO} 2018, V{\"{o}}sendorf / Vienna, Austria, February 24-28, 2018}, pages = {75--86}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3168833}, doi = {10.1145/3168833}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgo/BaumanWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BaumanLH18, author = {Erick Bauman and Zhiqiang Lin and Kevin W. Hamlen}, title = {Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-4\_Bauman\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BaumanLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarandeBLK17, author = {Vishal Karande and Erick Bauman and Zhiqiang Lin and Latifur Khan}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {SGX-Log: Securing System Logs With {SGX}}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {19--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053034}, doi = {10.1145/3052973.3053034}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarandeBLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/FuBQL17, author = {Yangchun Fu and Erick Bauman and Raul Quinonez and Zhiqiang Lin}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {357--380}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_16}, doi = {10.1007/978-3-319-66332-6\_16}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/FuBQL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/BaumanL16, author = {Erick Bauman and Zhiqiang Lin}, title = {A Case for Protecting Computer Games With {SGX}}, booktitle = {Proceedings of the 1st Workshop on System Software for Trusted Execution, SysTEX@Middleware 2016, Trento, Italy, December 12, 2016}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3007788.3007792}, doi = {10.1145/3007788.3007792}, timestamp = {Tue, 06 Nov 2018 16:57:13 +0100}, biburl = {https://dblp.org/rec/conf/middleware/BaumanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BaumanAL15, author = {Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin}, title = {A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {1}, pages = {10:1--10:33}, year = {2015}, url = {https://doi.org/10.1145/2775111}, doi = {10.1145/2775111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/BaumanAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BaumanLL15, author = {Erick Bauman and Yafeng Lu and Zhiqiang Lin}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Half a Century of Practice: Who Is Still Storing Plaintext Passwords?}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {253--267}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_18}, doi = {10.1007/978-3-319-17533-1\_18}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BaumanLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenCBLZG15, author = {Jin Chen and Haibo Chen and Erick Bauman and Zhiqiang Lin and Binyu Zang and Haibing Guan}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile {IME} Apps}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {657--690}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.