N-Variant Systems: A Secretless Framework for Security through Diversity. B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ... USENIX Security Symposium, 105-120, 2006 | 433 | 2006 |
ILR: Where'd my gadgets go? J Hiser, A Nguyen-Tuong, M Co, M Hall, JW Davidson 2012 IEEE Symposium on Security and Privacy, 571-585, 2012 | 285 | 2012 |
Secure and practical defense against code-injection attacks using software dynamic translation W Hu, J Hiser, D Williams, A Filipi, JW Davidson, D Evans, JC Knight, ... Proceedings of the 2nd international conference on Virtual execution …, 2006 | 166 | 2006 |
Fast searches for effective optimization phase sequences P Kulkarni, S Hines, J Hiser, D Whalley, J Davidson, D Jones ACM SIGPLAN Notices 39 (6), 171-182, 2004 | 160 | 2004 |
Security through diversity: Leveraging virtual machine technology D Williams, W Hu, JW Davidson, JD Hiser, JC Knight, A Nguyen-Tuong IEEE Security & Privacy 7 (1), 26-33, 2009 | 112 | 2009 |
Evaluating indirect branch handling mechanisms in software dynamic translation systems JD Hiser, D Williams, W Hu, JW Davidson, J Mars, BR Childers International Symposium on Code Generation and Optimization (CGO'07), 61-73, 2007 | 94 | 2007 |
Addressing the challenges of DBT for the ARM architecture RW Moore, JA Baiocchi, BR Childers, JW Davidson, JD Hiser Acm sigplan notices 44 (7), 147-156, 2009 | 91 | 2009 |
Vista: a system for interactive code improvement W Zhao, B Cai, D Whalley, MW Bailey, R Van Engelen, X Yuan, JD Hiser, ... ACM SIGPLAN Notices 37 (7), 155-164, 2002 | 61 | 2002 |
Fast and efficient searches for effective optimization-phase sequences PA Kulkarni, SR Hines, DB Whalley, JD Hiser, JW Davidson, DL Jones ACM Transactions on Architecture and Code Optimization (TACO) 2 (2), 165-198, 2005 | 50 | 2005 |
A secure and robust approach to software tamper resistance S Ghosh, JD Hiser, JW Davidson International Workshop on Information Hiding, 33-47, 2010 | 42 | 2010 |
Embarc: an efficient memory bank assignment algorithm for retargetable compilers JD Hiser, JW Davidson Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages …, 2004 | 42 | 2004 |
Method and System for Software Protection Using Binary Encoding JW Davidson, A Nguyen-Tuong, JC Rowanhill, DE Evans, JC Knight, ... US Patent App. 11/995,272, 2009 | 39 | 2009 |
Evaluating fragment construction policies for SDT systems JD Hiser, D Williams, A Filipi, JW Davidson, BR Childers Proceedings of the 2nd international conference on Virtual execution …, 2006 | 39 | 2006 |
System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms JW Davidson, JD Hiser US Patent App. 12/809,627, 2011 | 34 | 2011 |
Replacement attacks against vm-protected applications S Ghosh, J Hiser, JW Davidson Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 30 | 2012 |
Global register partitioning J Hiser, S Carr, P Sweany Proceedings 2000 International Conference on Parallel Architectures and …, 2000 | 30 | 2000 |
Methods, systems and computer readable media for detecting command injection attacks A Nguyen-Tuong, JW Davidson, JD Hiser, JC Knight US Patent 9,635,033, 2017 | 27 | 2017 |
Fragment cache management for dynamic binary translators in embedded systems with scratchpad J Baiocchi, BR Childers, JW Davidson, JD Hiser, J Misurda Proceedings of the 2007 international conference on Compilers, architecture …, 2007 | 27 | 2007 |
Meds: The memory error detection system JD Hiser, CL Coleman, M Co, JW Davidson International Symposium on Engineering Secure Software and Systems, 164-179, 2009 | 24 | 2009 |
Evaluating indirect branch handling mechanisms in software dynamic translation systems JD Hiser, DW Williams, W Hu, JW Davidson, J Mars, BR Childers ACM Transactions on Architecture and Code Optimization (TACO) 8 (2), 1-28, 2011 | 23 | 2011 |