Follow
Dr. Stephen Crane
Dr. Stephen Crane
Immunant Inc.
Verified email at uci.edu - Homepage
Title
Cited by
Cited by
Year
Readactor: Practical code randomization resilient to memory disclosure
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
IEEE Symposium on Security and Privacy, S&P 15, 2015
3242015
Losing control: On the effectiveness of control-flow integrity under stack attacks
M Conti, S Crane, L Davi, M Franz, P Larsen, M Negro, C Liebchen, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2132015
Thwarting cache side-channel attacks through dynamic software diversity
S Crane, A Homescu, S Brunthaler, P Larsen, M Franz
Network And Distributed System Security Symposium, NDSS 15, 2015
2052015
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
S Crane, S Volckaert, F Schuster, C Liebchen, P Larsen, L Davi, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1712015
Leakage-resilient layout randomization for mobile devices
K Braden, S Crane, L Davi, M Franz, P Larsen, C Liebchen, AR Sadeghi
Proceedings of the 2016 Network and Distributed System Security (NDSS) Symposium, 2016
1242016
Address-Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity
R Rudd, R Skowyra, D Bigelow, V Dedhia, T Hobson, S Crane, ...
Proceedings of the Network and Distributed System Security Symposium (NDSS’17), 2017
892017
Booby trapping software
S Crane, P Larsen, S Brunthaler, M Franz
Proceedings of the 2013 New Security Paradigms Workshop, 95-106, 2013
782013
Diversifying the software stack using randomized NOP insertion
T Jackson, A Homescu, S Crane, P Larsen, S Brunthaler, M Franz
Moving Target Defense II, 151-173, 2013
702013
Selfrando: Securing the Tor Browser against De-anonymization Exploits
M Conti, S Crane, T Frassetto, A Homescu, G Koppen, P Larsen, ...
Proceedings on Privacy Enhancing Technologies 2016 (4), 454-469, 2016
612016
Large-scale automated software diversity—program evolution redux
A Homescu, T Jackson, S Crane, S Brunthaler, P Larsen, M Franz
IEEE Transactions on Dependable and Secure Computing, 1-1, 2017
472017
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks
P Rajasekaran, S Crane, D Gens, Y Na, S Volckaert, M Franz
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
242020
Code randomization: Haven’t we solved this problem yet?
S Crane, A Homescu, P Larsen
2016 IEEE Cybersecurity Development (SecDev), 124-129, 2016
232016
Similarity-based matching meets Malware Diversity
M Payer, S Crane, P Larsen, S Brunthaler, R Wartell, M Franz
arXiv preprint arXiv:1409.7760, 2014
92014
Return to Where? You Can’t Exploit What You Can’t Find
S Crane, C Liebchen, A Homescu, L Davi, P Larsen, AR Sadeghi, ...
Proceedings of Black Hat USA, 2015
32015
Software diversification in external contexts
A Homescu, SJ Crane, P Larsen
US Patent App. 15/871,663, 2018
2018
Diversity and information leaks
S Crane, A Homescu, P Larsen, H Okhravi, M Franz
The Continuing Arms Race, 61-79, 2018
2018
The Continuing Arms Race: Code-Reuse Attacks and Defenses
S Crane, A Homescu, P Larsen, H Okhravi, M Franz
MIT Lincoln Laboratory Lexington United States, 2018
2018
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization
VS Dedhia, AR Sadeghi, RW Skowyra, D Bigelow, RA Rudd, H Okhravi, ...
MIT Lincoln Laboratory Lexington United States, 2016
2016
Execute-Only Attacks against Execute-Only Defenses
H Okhravi, R Rudd, T Hobson, D Bigelow, R Skowyra, V Dedhia, S Crane, ...
MIT Lincoln Laboratory Lexington United States, 2015
2015
Enhancing and Extending Software Diversity
S Crane
UNIVERSITY OF CALIFORNIA, IRVINE, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20