N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium 114, 114, 2006 | 473 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 330 | 2012 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 173 | 2006 |
Fast searches for effective optimization phase sequences P Kulkarni, S Hines, J Hiser, D Whalley, J Davidson, D Jones ACM SIGPLAN Notices 39 (6), 171-182, 2004 | 171 | 2004 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 119 | 2009 |
Addressing the challenges of DBT for the ARM architecture RW Moore, JA Baiocchi, BR Childers, JW Davidson, JD Hiser Acm sigplan notices 44 (7), 147-156, 2009 | 100 | 2009 |
Evaluating indirect branch handling mechanisms in software dynamic translation systems JD Hiser, D Williams, W Hu, JW Davidson, J Mars, BR Childers International Symposium on Code Generation and Optimization (CGO'07), 61-73, 2007 | 100 | 2007 |
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks 30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021 | 67 | 2021 |
ILR: Where'd My Gadgets Go? JW Davidson, M Hall, A Nguyen-Tuong, J Hiser 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 62 | 2012 |
Vista: a system for interactive code improvement W Zhao, B Cai, D Whalley, MW Bailey, R Van Engelen, X Yuan, JD Hiser, ... ACM SIGPLAN Notices 37 (7), 155-164, 2002 | 58 | 2002 |
Fast and efficient searches for effective optimization-phase sequences PA Kulkarni, SR Hines, DB Whalley, JD Hiser, JW Davidson, DL Jones ACM Transactions on Architecture and Code Optimization (TACO) 2 (2), 165-198, 2005 | 55 | 2005 |
System, method and computer readable medium for software protection via composable process-level virtual machines S Ghosh, JD Hiser, JW Davidson US Patent 11,042,631, 2021 | 45 | 2021 |
A secure and robust approach to software tamper resistance S Ghosh, JD Hiser, JW Davidson Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010 | 45 | 2010 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 41 | 2009 |
Zipr: Efficient static binary rewriting for security WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 39 | 2017 |
System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms JW Davidson, JD Hiser US Patent App. 12/809,627, 2011 | 38 | 2011 |
Embarc: an efficient memory bank assignment algorithm for retargetable compilers JD Hiser, JW Davidson Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004 | 38 | 2004 |
Evaluating fragment construction policies for SDT systems JD Hiser, D Williams, A Filipi, JW Davidson, BR Childers Proceedings of the 2nd international conference on Virtual execution …, 2006 | 37 | 2006 |
Replacement attacks against vm-protected applications S Ghosh, J Hiser, JW Davidson Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 35 | 2012 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 34 | 2017 |