H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 30 Citations 7,566 68 World Ranking 8890 National Ranking 430

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Computer security

His primary scientific interests are in Computer security, Return-oriented programming, Exploit, Android and Privilege escalation. His Computer security study often links to related topics such as Source code. His Return-oriented programming research focuses on Address space layout randomization and how it relates to Embedded system, Compiler, Redundant code, Code bloat and Code generation.

His work on Confused deputy problem as part of general Privilege escalation research is often related to Permission, thus linking different fields of science. Lucas Davi usually deals with Control-flow integrity and limits it to topics linked to Code reuse and Memory corruption, Virtual function, Object-oriented programming and Control flow. He has included themes like Code injection, Security analysis and Key in his Software study.

His most cited work include:

  • Return-oriented programming without returns (401 citations)
  • Privilege escalation attacks on android (374 citations)
  • Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (351 citations)

What are the main themes of his work throughout his whole career to date?

Lucas Davi spends much of his time researching Computer security, Software, Exploit, Code reuse and Memory corruption. Lucas Davi regularly ties together related areas like Overhead in his Computer security studies. His Software research includes themes of Control flow, Computer hardware, Embedded system and Hardware security module.

His Exploit research incorporates elements of Compiler, x86 and Code. His research investigates the link between Code reuse and topics such as Distributed computing that cross with problems in Static analysis. His research in Memory corruption intersects with topics in Symbolic execution, Function pointer and Laptop.

He most often published in these fields:

  • Computer security (67.05%)
  • Software (32.95%)
  • Exploit (28.41%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (67.05%)
  • Smart contract (6.82%)
  • Exploit (28.41%)

In recent papers he was focusing on the following fields of study:

Lucas Davi mainly investigates Computer security, Smart contract, Exploit, Memory corruption and Software. His research integrates issues of Testbed and Cloud computing in his study of Computer security. His Smart contract study integrates concerns from other disciplines, such as Signature, Computer network and Control flow graph.

Lucas Davi combines subjects such as Correctness, Microarchitecture and Backward compatibility with his study of Exploit. As a member of one scientific family, he mostly works in the field of Memory corruption, focusing on Function pointer and, on occasion, Guard. His work in Software addresses subjects such as Solidity, which are connected to disciplines such as Upgrade.

Between 2018 and 2021, his most popular works were:

  • Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks (39 citations)
  • Control Behavior Integrity for Distributed Cyber-Physical Systems (8 citations)
  • METHOD AND SYSTEM FOR SECURING SMART CONTRACTS IN BLOCKCHAINS (4 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

His primary areas of investigation include Computer security, Smart contract, Context, Cyber-physical system and Attack surface. His work deals with themes such as Signature, Distributed ledger and Control flow graph, which intersect with Smart contract. His Context research incorporates Exploit, Backward compatibility, Vulnerability assessment, Correctness and Overhead.

His Cyber-physical system study combines topics in areas such as Testbed, Critical infrastructure and Malware.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Privilege escalation attacks on android

Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi;Marcel Winandy.
international conference on information security (2010)

586 Citations

Return-oriented programming without returns

Stephen Checkoway;Lucas Davi;Alexandra Dmitrienko;Ahmad-Reza Sadeghi.
computer and communications security (2010)

576 Citations

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)

495 Citations

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
network and distributed system security symposium (2012)

489 Citations

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks

Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Thomas Fischer.
(2011)

347 Citations

ROPdefender: a detection tool to defend against return-oriented programming attacks

Lucas Davi;Ahmad-Reza Sadeghi;Marcel Winandy.
computer and communications security (2011)

342 Citations

Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection

Lucas Davi;Ahmad-Reza Sadeghi;Daniel Lehmann;Fabian Monrose.
usenix security symposium (2014)

340 Citations

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications

Felix Schuster;Thomas Tendyck;Christopher Liebchen;Lucas Davi.
ieee symposium on security and privacy (2015)

325 Citations

Practical and lightweight domain isolation on Android

Sven Bugiel;Lucas Davi;Alexandra Dmitrienko;Stephan Heuser.
security and privacy in smartphones and mobile devices (2011)

256 Citations

Readactor: Practical Code Randomization Resilient to Memory Disclosure

Stephen Crane;Christopher Liebchen;Andrei Homescu;Lucas Davi.
ieee symposium on security and privacy (2015)

236 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Lucas Davi

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 55

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 44

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 34

Mauro Conti

Mauro Conti

University of Padua

Publications: 33

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 30

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 27

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 26

Mathias Payer

Mathias Payer

École Polytechnique Fédérale de Lausanne

Publications: 25

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 24

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 22

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 19

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 18

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 18

William Enck

William Enck

North Carolina State University

Publications: 17

Xiaofeng Wang

Xiaofeng Wang

Indiana University

Publications: 17

Something went wrong. Please try again later.