Follow
Hans Liljestrand
Hans Liljestrand
University of Waterloo
Verified email at liljestrand.dev
Title
Cited by
Cited by
Year
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
H Liljestrand, T Nyman, K Wang, CC Perez, JE Ekberg, N Asokan
28th USENIX Security Symposium (USENIX Security 19), 177-194, 2019
1522019
Authenticated call stack
H Liljestrand, T Nyman, JE Ekberg, N Asokan
Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019
762019
Mitigating branch-shadowing attacks on intel sgx using control flow randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
Proceedings of the 3rd Workshop on System Software for Trusted Execution, 42-47, 2018
302018
Protecting the stack with PACed canaries
H Liljestrand, Z Gauhar, T Nyman, JE Ekberg, N Asokan
Proceedings of the 4th Workshop on System Software for Trusted Execution, 1-6, 2019
252019
Exploitation techniques and defenses for data-oriented attacks
L Cheng, H Liljestrand, MS Ahmed, T Nyman, T Jaeger, N Asokan, D Yao
2019 IEEE Cybersecurity Development (SecDev), 114-128, 2019
242019
Camouflage: Hardware-assisted CFI for the ARM Linux kernel
R Denis-Courmont, H Liljestrand, C Chinea, JE Ekberg
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
222020
STASH: Securing transparent authentication schemes using prover-side proximity verification
M Juuti, C Vaas, I Sluganovic, H Liljestrand, N Asokan, I Martinovic
2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017
152017
Exploitation techniques for data-oriented attacks with existing and potential defense approaches
L Cheng, S Ahmed, H Liljestrand, T Nyman, H Cai, T Jaeger, N Asokan, ...
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021
142021
Toward Linux kernel memory safety
E Reshetova, H Liljestrand, A Paverd, N Asokan
Software: Practice and Experience 48 (12), 2237-2256, 2018
92018
Hardware platform security for mobile devices
LJ Gunn, N Asokan, JE Ekberg, H Liljestrand, V Nayani, T Nyman
Foundations and Trends® in Privacy and Security 3 (3-4), 214-394, 2022
72022
EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks
P Nasahl, S Sultana, H Liljestrand, K Grewal, M LeMay, DM Durham, ...
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
52023
Changing the way the world works: IBM Research’s “5 in 5”
A Krishna, AI Trustworthy, H Liljestrand, H Jamjoom, M Hicks, N Asokan, ...
IBM, 2019
32019
Updating encrypted security context in stack pointers for exception handling and tight bounding of on-stack arguments
HG Liljestrand, S Deutsch, DM Durham, M LeMay, KS Grewal
US Patent App. 17/947,072, 2023
22023
Color My World: Deterministic Tagging for Memory Safety
H Liljestrand, C Chinea, R Denis-Courmont, JE Ekberg, N Asokan
arXiv preprint arXiv:2204.03781, 2022
22022
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication
M Juuti, C Vaas, H Liljestrand, I Sluganovic, N Asokan, I Martinovic
2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017
22017
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
H ElAtali, LJ Gunn, H Liljestrand, N Asokan
arXiv preprint arXiv:2204.09649, 2022
12022
Tutorial: Investigating Advanced Exploits for System Security Assurance
S Ahmed, L Cheng, H Liljestrand, N Asokan, DD Yao
2021 IEEE Secure Development Conference (SecDev), 3-4, 2021
12021
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against {Data-Oriented} Attacks
S Ahmed, H Liljestrand, H Jamjoom, M Hicks, N Asokan, DD Yao
32nd USENIX Security Symposium (USENIX Security 23), 1433-1450, 2023
2023
Towards cryptographically-authenticated in-memory data structures
S Ghorshi, LJ Gunn, H Liljestrand, N Asokan
2022 IEEE Secure Development Conference (SecDev), 30-44, 2022
2022
Ratchet pointers to enforce byte-granular bounds checks on multiple views of an object
M LeMay, HG Liljestrand, LIU Peiming, DM Durham, S Constable
US Patent App. 17/696,330, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20