The scientist’s investigation covers issues in Computer security, Operating system, Exploit, Embedded system and Source code. Herbert Bos interconnects Peer-to-peer, Memory management, The Internet, System call and Control flow in the investigation of issues within Computer security. His research is interdisciplinary, bridging the disciplines of Rendering and Operating system.
The concepts of his Exploit study are interwoven with issues in Speculative execution, Central processing unit and Out-of-order execution. His Embedded system research is multidisciplinary, relying on both Software bug, Stack, Page, Memory deduplication and Zero-day attack. His Source code research includes themes of Debugging and Code reuse.
Computer security, Operating system, Embedded system, Computer network and Distributed computing are his primary areas of study. His work focuses on many connections between Computer security and other disciplines, such as Software, that overlap with his field of interest in Source code. His research in Operating system focuses on subjects like Pointer, which are connected to Spec#.
His Embedded system research includes elements of Network monitoring, Scalability and Reliability. His work carried out in the field of Computer network brings together such families of science as Intrusion detection system and Gigabit. His Exploit research incorporates elements of Address space and Code.
His primary areas of investigation include Computer security, Software, Exploit, Operating system and Embedded system. The Computer security study combines topics in areas such as Address space, Page fault and Memory management. Herbert Bos usually deals with Software and limits it to topics linked to Pointer and Virtual function.
His biological study spans a wide range of topics, including Overhead, Distributed computing and Code. Within one scientific family, Herbert Bos focuses on topics pertaining to Spec# under Operating system, and may sometimes address concerns connected to Heap and Parallel computing. The various areas that Herbert Bos examines in his Embedded system study include Side channel attack and Reliability.
Herbert Bos focuses on Computer security, Exploit, Software, Address space and Code. His research integrates issues of Virtual machine, Page fault, Memory management, JavaScript and Source code in his study of Computer security. His research in Exploit intersects with topics in Overhead, Mobile device and Code reuse.
His Software study incorporates themes from Suite, Documentation and Physical address. His Memory footprint research is within the category of Operating system. His research on Operating system focuses in particular on Cloud computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Paranoid Android: versatile protection for smartphones
Georgios Portokalidis;Philip Homburg;Kostas Anagnostakis;Herbert Bos.
annual computer security applications conference (2010)
VUzzer: Application-aware Evolutionary Fuzzing.
Sanjay Rawat;Vivek Jain;Ashish Kumar;Lucian Cojocar.
network and distributed system security symposium (2017)
Out of Control: Overcoming Control-Flow Integrity
Enes Goktas;Elias Athanasopoulos;Herbert Bos;Georgios Portokalidis.
ieee symposium on security and privacy (2014)
Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
Georgios Portokalidis;Asia Slowinska;Herbert Bos.
european conference on computer systems (2006)
On Botnets That Use DNS for Command and Control.
Christian J. Dietrich;Christian Rossow;Felix C. Freiling;Herbert Bos.
electronic commerce (2011)
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Victor van der Veen;Yanick Fratantonio;Martina Lindorfer;Daniel Gruss.
computer and communications security (2016)
Dowsing for overflows: a guided fuzzer to find buffer boundary violations
Istvan Haller;Asia Slowinska;Matthias Neugschwandtner;Herbert Bos.
usenix security symposium (2013)
Practical Context-Sensitive CFI
Victor van der Veen;Dennis Andriesse;Enes Göktaş;Ben Gras.
computer and communications security (2015)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
C. Rossow;C. J. Dietrich;C. Grier;C. Kreibich.
ieee symposium on security and privacy (2012)
RIDL: Rogue In-Flight Data Load
Stephan van Schaik;Alyssa Milburn;Sebastian Osterlund;Pietro Frigo.
ieee symposium on security and privacy (2019)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Vrije Universiteit Amsterdam
Vrije Universiteit Amsterdam
Saarland University
Ruhr University Bochum
University of Crete
University of Amsterdam
Technical University of Crete
Vrije Universiteit Amsterdam
Northeastern University
University of Erlangen-Nuremberg
Texas A&M University
University of South Florida
University of Illinois at Urbana-Champaign
Southern University of Science and Technology
KU Leuven
University of Oxford
Hebrew University of Jerusalem
Technical University of Crete
University of Bern
Spanish National Research Council
University of Cambridge
Concordia University
Michigan State University
University of Bologna
University of Tennessee Health Science Center
University of Glasgow