Follow
Jason Hiser
Jason Hiser
Principal Scientist in Department of Computer Science, University of Virginia
Verified email at virginia.edu
Title
Cited by
Cited by
Year
N-Variant Systems: A Secretless Framework for Security through Diversity.
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
USENIX Security Symposium 114, 114, 2006
4592006
ILR: Where'd my gadgets go?
J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson
2012 IEEE Symposium on Security and Privacy, 571-585, 2012
3282012
Secure and practical defense against code-injection attacks using software dynamic translation
W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ...
Proceedings of the 2nd international conference on Virtual execution …, 2006
1722006
Fast searches for effective optimization phase sequences
P Kulkarni, S Hines, J Hiser, D Whalley, J Davidson, D Jones
ACM SIGPLAN Notices 39 (6), 171-182, 2004
1682004
Security through diversity: Leveraging virtual machine technology
D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong
IEEE Security & Privacy 7 (1), 26-33, 2009
1192009
Addressing the challenges of DBT for the ARM architecture
RW Moore, JA Baiocchi, BR Childers, JW Davidson, JD Hiser
Acm sigplan notices 44 (7), 147-156, 2009
962009
Evaluating indirect branch handling mechanisms in software dynamic translation systems
JD Hiser, D Williams, W Hu, JW Davidson, J Mars, BR Childers
International Symposium on Code Generation and Optimization (CGO'07), 61-73, 2007
962007
Vista: a system for interactive code improvement
W Zhao, B Cai, D Whalley, MW Bailey, R Van Engelen, X Yuan, JD Hiser, ...
ACM SIGPLAN Notices 37 (7), 155-164, 2002
582002
Fast and efficient searches for effective optimization-phase sequences
PA Kulkarni, SR Hines, DB Whalley, JD Hiser, JW Davidson, DL Jones
ACM Transactions on Architecture and Code Optimization (TACO) 2 (2), 165-198, 2005
532005
Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing
S Nagy, A Nguyen-Tuong, JD Hiser, JW Davidson, M Hicks
30th USENIX Security Symposium (USENIX Security 21), 1683-1700, 2021
522021
ILR: Where'd My Gadgets Go?
JW Davidson, M Hall, A Nguyen-Tuong, J Hiser
2012 IEEE Symposium on Security and Privacy, 571-585, 2012
472012
A secure and robust approach to software tamper resistance
S Ghosh, JD Hiser, JW Davidson
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
442010
System, method and computer readable medium for software protection via composable process-level virtual machines
S Ghosh, JD Hiser, JW Davidson
US Patent 11,042,631, 2021
412021
Method and System for Software Protection Using Binary Encoding
JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ...
US Patent App. 11/995,272, 2009
412009
Embarc: an efficient memory bank assignment algorithm for retargetable compilers
JD Hiser, JW Davidson
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004
402004
Zipr: Efficient static binary rewriting for security
WH Hawkins, JD Hiser, M Co, A Nguyen-Tuong, JW Davidson
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
372017
System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
JW Davidson, JD Hiser
US Patent App. 12/809,627, 2011
372011
Evaluating fragment construction policies for SDT systems
JD Hiser, D Williams, A Filipi, JW Davidson, BR Childers
Proceedings of the 2nd international conference on Virtual execution …, 2006
372006
Replacement attacks against vm-protected applications
S Ghosh, J Hiser, JW Davidson
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
342012
Methods, systems and computer readable media for detecting command injection attacks
A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight
US Patent 9,635,033, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20