BibTeX records: Erick Bauman

download as .bib file

@inproceedings{DBLP:conf/raid/BaumanDHL23,
  author       = {Erick Bauman and
                  Jun Duan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  title        = {Renewable Just-In-Time Control-Flow Integrity},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {580--594},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607239},
  doi          = {10.1145/3607199.3607239},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hf/MarklinTBSLC22,
  author       = {Richard W. Marklin and
                  Ashley M. Toll and
                  Erick Bauman and
                  John J. Simmins and
                  John F. LaDisa Jr. and
                  Robert Cooper},
  title        = {Do Head-Mounted Augmented Reality Devices Affect Muscle Activity and
                  Eye Strain of Utility Workers Who Do Procedural Work? Studies of Operators
                  and Manhole Workers},
  journal      = {Hum. Factors},
  volume       = {64},
  number       = {2},
  pages        = {305--323},
  year         = {2022},
  url          = {https://doi.org/10.1177/0018720820943710},
  doi          = {10.1177/0018720820943710},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hf/MarklinTBSLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/HeBLYLLPHHZ20,
  author       = {Xiaoyu He and
                  Erick Bauman and
                  Feng Li and
                  Lei Yu and
                  Linyu Li and
                  Bingchang Liu and
                  Aihua Piao and
                  Kevin W. Hamlen and
                  Wei Huo and
                  Wei Zou},
  editor       = {Jingling Xue and
                  Changhee Jung},
  title        = {Exploiting the Trust Between Boundaries: Discovering Memory Corruptions
                  in Printers via Driver-Assisted Testing},
  booktitle    = {Proceedings of the 21st {ACM} {SIGPLAN/SIGBED} International Conference
                  on Languages, Compilers, and Tools for Embedded Systems, {LCTES} 2020,
                  London, UK, June 16, 2020},
  pages        = {74--84},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372799.3394363},
  doi          = {10.1145/3372799.3394363},
  timestamp    = {Sun, 14 Jun 2020 14:42:15 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/HeBLYLLPHHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/QuinonezGSBCL20,
  author       = {Raul Quinonez and
                  Jairo Giraldo and
                  Luis E. Salazar and
                  Erick Bauman and
                  Alvaro A. C{\'{a}}rdenas and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{SAVIOR:} Securing Autonomous Vehicles with Robust Physical Invariants},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {895--912},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/quinonez},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/QuinonezGSBCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/AyoadeBKH19,
  author       = {Gbadebo Ayoade and
                  Erick Bauman and
                  Latifur Khan and
                  Kevin W. Hamlen},
  title        = {Smart Contract Defense through Bytecode Rewriting},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {384--389},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00059},
  doi          = {10.1109/BLOCKCHAIN.2019.00059},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/AyoadeBKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangBKLCZ19,
  author       = {Huibo Wang and
                  Erick Bauman and
                  Vishal Karande and
                  Zhiqiang Lin and
                  Yueqiang Cheng and
                  Yinqian Zhang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible
                  Script Code Hardening Approach},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {114--121},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329848},
  doi          = {10.1145/3321705.3329848},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/BaumanWZL18,
  author       = {Erick Bauman and
                  Huibo Wang and
                  Mingwei Zhang and
                  Zhiqiang Lin},
  editor       = {Jens Knoop and
                  Markus Schordan and
                  Teresa Johnson and
                  Michael F. P. O'Boyle},
  title        = {SGXElide: enabling enclave code secrecy via self-modification},
  booktitle    = {Proceedings of the 2018 International Symposium on Code Generation
                  and Optimization, {CGO} 2018, V{\"{o}}sendorf / Vienna, Austria,
                  February 24-28, 2018},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3168833},
  doi          = {10.1145/3168833},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cgo/BaumanWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BaumanLH18,
  author       = {Erick Bauman and
                  Zhiqiang Lin and
                  Kevin W. Hamlen},
  title        = {Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05A-4\_Bauman\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BaumanLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarandeBLK17,
  author       = {Vishal Karande and
                  Erick Bauman and
                  Zhiqiang Lin and
                  Latifur Khan},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {SGX-Log: Securing System Logs With {SGX}},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053034},
  doi          = {10.1145/3052973.3053034},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KarandeBLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuBQL17,
  author       = {Yangchun Fu and
                  Erick Bauman and
                  Raul Quinonez and
                  Zhiqiang Lin},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable
                  Page Faults},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {357--380},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_16},
  doi          = {10.1007/978-3-319-66332-6\_16},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FuBQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/BaumanL16,
  author       = {Erick Bauman and
                  Zhiqiang Lin},
  title        = {A Case for Protecting Computer Games With {SGX}},
  booktitle    = {Proceedings of the 1st Workshop on System Software for Trusted Execution,
                  SysTEX@Middleware 2016, Trento, Italy, December 12, 2016},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3007788.3007792},
  doi          = {10.1145/3007788.3007792},
  timestamp    = {Tue, 06 Nov 2018 16:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/BaumanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BaumanAL15,
  author       = {Erick Bauman and
                  Gbadebo Ayoade and
                  Zhiqiang Lin},
  title        = {A Survey on Hypervisor-Based Monitoring: Approaches, Applications,
                  and Evolutions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {48},
  number       = {1},
  pages        = {10:1--10:33},
  year         = {2015},
  url          = {https://doi.org/10.1145/2775111},
  doi          = {10.1145/2775111},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BaumanAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/BaumanLL15,
  author       = {Erick Bauman and
                  Yafeng Lu and
                  Zhiqiang Lin},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Half a Century of Practice: Who Is Still Storing Plaintext Passwords?},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_18},
  doi          = {10.1007/978-3-319-17533-1\_18},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/BaumanLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenCBLZG15,
  author       = {Jin Chen and
                  Haibo Chen and
                  Erick Bauman and
                  Zhiqiang Lin and
                  Binyu Zang and
                  Haibing Guan},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage
                  in Mobile {IME} Apps},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {657--690},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/chen-jin},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenCBLZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics