His primary scientific interests are in Computer security, Return-oriented programming, Exploit, Android and Privilege escalation. His Computer security study often links to related topics such as Source code. His Return-oriented programming research focuses on Address space layout randomization and how it relates to Embedded system, Compiler, Redundant code, Code bloat and Code generation.
His work on Confused deputy problem as part of general Privilege escalation research is often related to Permission, thus linking different fields of science. Lucas Davi usually deals with Control-flow integrity and limits it to topics linked to Code reuse and Memory corruption, Virtual function, Object-oriented programming and Control flow. He has included themes like Code injection, Security analysis and Key in his Software study.
Lucas Davi spends much of his time researching Computer security, Software, Exploit, Code reuse and Memory corruption. Lucas Davi regularly ties together related areas like Overhead in his Computer security studies. His Software research includes themes of Control flow, Computer hardware, Embedded system and Hardware security module.
His Exploit research incorporates elements of Compiler, x86 and Code. His research investigates the link between Code reuse and topics such as Distributed computing that cross with problems in Static analysis. His research in Memory corruption intersects with topics in Symbolic execution, Function pointer and Laptop.
Lucas Davi mainly investigates Computer security, Smart contract, Exploit, Memory corruption and Software. His research integrates issues of Testbed and Cloud computing in his study of Computer security. His Smart contract study integrates concerns from other disciplines, such as Signature, Computer network and Control flow graph.
Lucas Davi combines subjects such as Correctness, Microarchitecture and Backward compatibility with his study of Exploit. As a member of one scientific family, he mostly works in the field of Memory corruption, focusing on Function pointer and, on occasion, Guard. His work in Software addresses subjects such as Solidity, which are connected to disciplines such as Upgrade.
His primary areas of investigation include Computer security, Smart contract, Context, Cyber-physical system and Attack surface. His work deals with themes such as Signature, Distributed ledger and Control flow graph, which intersect with Smart contract. His Context research incorporates Exploit, Backward compatibility, Vulnerability assessment, Correctness and Overhead.
His Cyber-physical system study combines topics in areas such as Testbed, Critical infrastructure and Malware.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Return-oriented programming without returns
Stephen Checkoway;Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi.
computer and communications security (2010)
Privilege escalation attacks on android
Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi;Marcel Winandy.
international conference on information security (2010)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)
Towards Taming Privilege-Escalation Attacks on Android
Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
network and distributed system security symposium (2012)
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Felix Schuster;Thomas Tendyck;Christopher Liebchen;Lucas Davi.
ieee symposium on security and privacy (2015)
Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection
Lucas Davi;Ahmad-Reza Sadeghi;Daniel Lehmann;Fabian Monrose.
usenix security symposium (2014)
ROPdefender: a detection tool to defend against return-oriented programming attacks
Lucas Davi;Ahmad-Reza Sadeghi;Marcel Winandy.
computer and communications security (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
(2011)
The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin;Charalambos Konstantinou;Xueyang Wang;Lucas Davi.
Proceedings of the IEEE (2016)
Readactor: Practical Code Randomization Resilient to Memory Disclosure
Stephen Crane;Christopher Liebchen;Andrei Homescu;Lucas Davi.
ieee symposium on security and privacy (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Technical University of Darmstadt
Ruhr University Bochum
University of Waterloo
Ruhr University Bochum
University of Florida
University of North Carolina at Chapel Hill
University of California, Irvine
Aalto University
North Carolina State University
Ruhr University Bochum
BlackRock (United States)
Vanderbilt University
Max Planck Society
Spanish National Research Council
University of Sydney
University of California, San Francisco
Utsunomiya University
University of Arizona
University of Liverpool
German Aerospace Center
San Diego State University
University of Leicester
University of Murcia
Tufts University
South African Medical Research Council
Columbia University