Enes Göktaş
Enes Göktaş
Verified email at vu.nl
TitleCited byYear
Out of control: Overcoming control-flow integrity
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
2014 IEEE Symposium on Security and Privacy, 575-589, 2014
3242014
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
E Göktaş, E Athanasopoulos, M Polychronakis, H Bos, G Portokalidis
23rd USENIX Security Symposium, San Diego, CA, 417-432, 2014
1492014
Practical Context-Sensitive CFI
V van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1352015
A tough call: Mitigating advanced code-reuse attacks at the binary level
V van der Veen, E Göktas, M Contag, A Pawlowski, X Chen, S Rawat, ...
IEEE Symposium on Security and Privacy (S&P), 2016
982016
Undermining Information Hiding (And What to do About it)
E Göktas, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
USENIX Security 16, 2016
49*2016
ShrinkWrap: VTable Protection without Loose Ends
I Haller, E Göktaş, E Athanasopoulos, G Portokalidis, H Bos
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
412015
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
E Göktas, B Kollenda, P Koppe, E Bosman, G Portokalidis, T Holz, H Bos, ...
3rd IEEE European Symposium on Security and Privacy, 2018
102018
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP …, 2017
82017
Evaluating Control-Flow Restricting Defenses
E Göktas, E Athanasopoulos, H Bos, G Portokalidis
The Continuing Arms Race, 117-137, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–9