Publications
Manifest Problems: Analyzing Code Transparency for Android Application Bundles
Draschbacher F., Maar L.
Annual Computer Security Applications Conference, Annual Computer Security Applications Conference
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels
Maar L., Draschbacher F., Lamster L., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Usenix Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI
Maar L., Nasahl P., Mangard S.
ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 19th ACM ASIA Conference on Computer and Communications Security, 866-882, (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security)
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))