Silhouette: Efficient protected shadow stacks for embedded systems J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls 29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020 | 48 | 2020 |
Beating OPT with statistical clairvoyance and variable size caching P Li, C Pronovost, W Wilson, B Tait, J Zhou, C Ding, J Criswell Proceedings of the Twenty-Fourth International Conference on Architectural …, 2019 | 26 | 2019 |
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell 31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022 | 20 | 2022 |
Restricting control flow during speculative execution with venkman Z Shen, J Zhou, D Ojha, J Criswell arXiv preprint arXiv:1903.10651, 2019 | 15 | 2019 |
Refactoring the FreeBSD kernel with Checked C J Duan, Y Yang, J Zhou, J Criswell 2020 IEEE Secure Development (SecDev), 15-22, 2020 | 9 | 2020 |
Restricting control flow during speculative execution Z Shen, J Zhou, D Ojha, J Criswell Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 8 | 2018 |
Transforming code to drop dead privileges X Hu, J Zhou, S Gravani, J Criswell 2018 IEEE Cybersecurity Development (SecDev), 45-52, 2018 | 5 | 2018 |
Fat Pointers for Temporal Memory Safety of C J Zhou, J Criswell, M Hicks Proceedings of the ACM on Programming Languages 7 (OOPSLA1), 316-347, 2023 | 4 | 2023 |
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use J Criswell, J Zhou, S Gravani, X Hu 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 3 | 2019 |
Fast Summary-based Whole-program Analysis to Identify Unsafe Memory Accesses in Rust J Zhou, M Sun, J Criswell arXiv preprint arXiv:2310.10298, 2023 | | 2023 |
Securing Low-level Software with Memory Safety Incrementally J Zhou University of Rochester, 2023 | | 2023 |
POSTER: Restricting Control Flow During Speculative Execution Z Shen, J Zhou, D Ojha, J Criswell | | 2018 |