D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 10,816 234 World Ranking 2578 National Ranking 27

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Computer network

The scientist’s investigation covers issues in Computer security, Operating system, Exploit, Embedded system and Source code. Herbert Bos interconnects Peer-to-peer, Memory management, The Internet, System call and Control flow in the investigation of issues within Computer security. His research is interdisciplinary, bridging the disciplines of Rendering and Operating system.

The concepts of his Exploit study are interwoven with issues in Speculative execution, Central processing unit and Out-of-order execution. His Embedded system research is multidisciplinary, relying on both Software bug, Stack, Page, Memory deduplication and Zero-day attack. His Source code research includes themes of Debugging and Code reuse.

His most cited work include:

  • Paranoid Android: versatile protection for smartphones (323 citations)
  • VUzzer: Application-aware Evolutionary Fuzzing. (267 citations)
  • Out of Control: Overcoming Control-Flow Integrity (255 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Operating system, Embedded system, Computer network and Distributed computing are his primary areas of study. His work focuses on many connections between Computer security and other disciplines, such as Software, that overlap with his field of interest in Source code. His research in Operating system focuses on subjects like Pointer, which are connected to Spec#.

His Embedded system research includes elements of Network monitoring, Scalability and Reliability. His work carried out in the field of Computer network brings together such families of science as Intrusion detection system and Gigabit. His Exploit research incorporates elements of Address space and Code.

He most often published in these fields:

  • Computer security (27.90%)
  • Operating system (21.46%)
  • Embedded system (18.03%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (27.90%)
  • Software (10.73%)
  • Exploit (8.15%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Software, Exploit, Operating system and Embedded system. The Computer security study combines topics in areas such as Address space, Page fault and Memory management. Herbert Bos usually deals with Software and limits it to topics linked to Pointer and Virtual function.

His biological study spans a wide range of topics, including Overhead, Distributed computing and Code. Within one scientific family, Herbert Bos focuses on topics pertaining to Spec# under Operating system, and may sometimes address concerns connected to Heap and Parallel computing. The various areas that Herbert Bos examines in his Embedded system study include Side channel attack and Reliability.

Between 2015 and 2021, his most popular works were:

  • VUzzer: Application-aware Evolutionary Fuzzing. (267 citations)
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (168 citations)
  • Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector (133 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer network

Herbert Bos focuses on Computer security, Exploit, Software, Address space and Code. His research integrates issues of Virtual machine, Page fault, Memory management, JavaScript and Source code in his study of Computer security. His research in Exploit intersects with topics in Overhead, Mobile device and Code reuse.

His Software study incorporates themes from Suite, Documentation and Physical address. His Memory footprint research is within the category of Operating system. His research on Operating system focuses in particular on Cloud computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Paranoid Android: versatile protection for smartphones

Georgios Portokalidis;Philip Homburg;Kostas Anagnostakis;Herbert Bos.
annual computer security applications conference (2010)

534 Citations

VUzzer: Application-aware Evolutionary Fuzzing.

Sanjay Rawat;Vivek Jain;Ashish Kumar;Lucian Cojocar.
network and distributed system security symposium (2017)

497 Citations

Out of Control: Overcoming Control-Flow Integrity

Enes Goktas;Elias Athanasopoulos;Herbert Bos;Georgios Portokalidis.
ieee symposium on security and privacy (2014)

479 Citations

Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation

Georgios Portokalidis;Asia Slowinska;Herbert Bos.
european conference on computer systems (2006)

452 Citations

On Botnets That Use DNS for Command and Control.

Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)

278 Citations

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Victor van der Veen;Yanick Fratantonio;Martina Lindorfer;Daniel Gruss.
computer and communications security (2016)

267 Citations

Dowsing for overflows: a guided fuzzer to find buffer boundary violations

Istvan Haller;Asia Slowinska;Matthias Neugschwandtner;Herbert Bos.
usenix security symposium (2013)

262 Citations

Practical Context-Sensitive CFI

Victor van der Veen;Dennis Andriesse;Enes Göktaş;Ben Gras.
computer and communications security (2015)

244 Citations

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

C. Rossow;C. J. Dietrich;C. Grier;C. Kreibich.
ieee symposium on security and privacy (2012)

238 Citations

RIDL: Rogue In-Flight Data Load

Stephan van Schaik;Alyssa Milburn;Sebastian Osterlund;Pietro Frigo.
ieee symposium on security and privacy (2019)

235 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Herbert Bos

Onur Mutlu

Onur Mutlu

ETH Zurich

Publications: 44

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 43

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 39

Mathias Payer

Mathias Payer

École Polytechnique Fédérale de Lausanne

Publications: 38

Heng Yin

Heng Yin

University of California, Riverside

Publications: 33

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 29

Taesoo Kim

Taesoo Kim

Georgia Institute of Technology

Publications: 27

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 27

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 26

Andrew S. Tanenbaum

Andrew S. Tanenbaum

Vrije Universiteit Amsterdam

Publications: 25

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 24

Christian Rossow

Christian Rossow

Saarland University

Publications: 24

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 23

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 23

Mauro Conti

Mauro Conti

University of Padua

Publications: 23

Saugata Ghose

Saugata Ghose

University of Illinois at Urbana-Champaign

Publications: 21

Trending Scientists

Shankar P. Bhattacharyya

Shankar P. Bhattacharyya

Texas A&M University

Dmitry B. Goldgof

Dmitry B. Goldgof

University of South Florida

Ibrahim N. Hajj

Ibrahim N. Hajj

University of Illinois at Urbana-Champaign

Jian Fei Chen

Jian Fei Chen

Southern University of Science and Technology

Geert Lombaert

Geert Lombaert

KU Leuven

Keith Gull

Keith Gull

University of Oxford

Henryk Czosnek

Henryk Czosnek

Hebrew University of Jerusalem

Nikolaos P. Nikolaidis

Nikolaos P. Nikolaidis

Technical University of Crete

Urs Wegmüller

Urs Wegmüller

University of Bern

Juan J. Jiménez

Juan J. Jiménez

Spanish National Research Council

Claire O'Callaghan

Claire O'Callaghan

University of Cambridge

Alexandre J. S. Morin

Alexandre J. S. Morin

Concordia University

Thomas H. Carr

Thomas H. Carr

Michigan State University

Giuseppe Filardo

Giuseppe Filardo

University of Bologna

Martin A. Croce

Martin A. Croce

University of Tennessee Health Science Center

Sally Wyke

Sally Wyke

University of Glasgow

Something went wrong. Please try again later.