default search action
Per Larsen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Per Larsen:
Migrating C to Rust for Memory Safety. IEEE Secur. Priv. 22(4): 22-29 (2024) - [c47]Thomas Larsen, Per Larsen, Pernille Bjørn:
Situational Awareness Data Extraction from Cooperative Virtual Reality Maritime Training Simulations. ECSCW 2024 - 2022
- [c46]Paul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
PKRU-safe: automatically locking down the heap between safe and unsafe languages. EuroSys 2022: 132-148 - 2021
- [c45]Alexios Voulimeneas, Dokyung Song, Per Larsen, Michael Franz, Stijn Volckaert:
dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting. EuroSec@EuroSys 2021: 41-47 - 2020
- [c44]Per Larsen, Michael Franz:
Adoption Challenges of Code Randomization. MTD@CCS 2020: 45-49 - [c43]Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert:
Distributed Heterogeneous N-Variant Execution. DIMVA 2020: 217-237 - [i7]Alexios Voulimeneas, Dokyung Song, Per Larsen, Michael Franz, Stijn Volckaert:
dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting. CoRR abs/2011.02091 (2020)
2010 – 2019
- 2019
- [c42]Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz:
SoK: Sanitizing for Security. IEEE Symposium on Security and Privacy 2019: 1275-1295 - [i6]Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, Stijn Volckaert:
DMON: A Distributed Heterogeneous N-Variant System. CoRR abs/1903.03643 (2019) - 2018
- [j12]Timothy Vidas, Per Larsen, Hamed Okhravi, Ahmad-Reza Sadeghi:
Changing the Game of Software Security. IEEE Secur. Priv. 16(2): 10-11 (2018) - [c41]Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz:
Hardware Assisted Randomization of Data. RAID 2018: 337-358 - [c40]Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz:
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning. RAID 2018: 403-422 - [p2]Stephen Crane, Andrei Homescu, Per Larsen, Hamed Okhravi, Michael Franz:
Diversity and information leaks. The Continuing Arms Race 2018: 61-79 - [e1]Per Larsen, Ahmad-Reza Sadeghi:
The Continuing Arms Race: Code-Reuse Attacks and Defenses. ACM / Morgan & Claypool 2018, ISBN 978-1-97000-183-9 [contents] - [i5]Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, Michael Franz:
SoK: Sanitizing for Security. CoRR abs/1806.04355 (2018) - 2017
- [j11]Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer:
Control-Flow Integrity: Precision, Security, and Performance. ACM Comput. Surv. 50(1): 16:1-16:33 (2017) - [j10]Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler, Per Larsen, Michael Franz:
Large-Scale Automated Software Diversity - Program Evolution Redux. IEEE Trans. Dependable Secur. Comput. 14(2): 158-171 (2017) - [c39]Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen, Michael Franz:
Taming Parallelism in a Multi-Variant Execution Environment. EuroSys 2017: 270-285 - [c38]Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi:
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. NDSS 2017 - [i4]Julian Lettner, Dokyung Song, Taemin Park, Stijn Volckaert, Per Larsen, Michael Franz:
PartiSan: Fast and Flexible Sanitization via Run-time Partitioning. CoRR abs/1711.08108 (2017) - 2016
- [j9]Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, Ahmad-Reza Sadeghi:
Selfrando: Securing the Tor Browser against De-anonymization Exploits. Proc. Priv. Enhancing Technol. 2016(4): 454-469 (2016) - [j8]Gregor Wagner, Per Larsen, Stefan Brunthaler, Michael Franz:
Thinking Inside the Box: Compartmentalized Garbage Collection. ACM Trans. Program. Lang. Syst. 38(3): 9:1-9:37 (2016) - [c37]Jason Gionta, William Enck, Per Larsen:
Preventing kernel code-reuse attacks through disclosure resistant code diversification. CNS 2016: 189-197 - [c36]Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Yier Jin:
Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity. DAC 2016: 163:1-163:6 - [c35]Kjell Braden, Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Stephen Crane, Michael Franz, Per Larsen:
Leakage-Resilient Layout Randomization for Mobile Devices. NDSS 2016 - [c34]Stephen Crane, Andrei Homescu, Per Larsen:
Code Randomization: Haven't We Solved This Problem Yet? SecDev 2016: 124-129 - [c33]Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, Michael Franz:
Secure and Efficient Application Monitoring and Replication. USENIX ATC 2016: 167-179 - [c32]Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Michael Franz:
Subversive-C: Abusing and Protecting Dynamic Message Dispatch. USENIX ATC 2016: 209-221 - [i3]Nathan Burow, Scott A. Carr, Stefan Brunthaler, Mathias Payer, Joseph Nash, Per Larsen, Michael Franz:
Control-Flow Integrity: Precision, Security, and Performance. CoRR abs/1602.04056 (2016) - [i2]Stijn Volckaert, Bjorn De Sutter, Koen De Bosschere, Per Larsen:
Multi-Variant Execution of Parallel Programs. CoRR abs/1607.07841 (2016) - 2015
- [b1]Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz:
Automated Software Diversity. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2015, ISBN 978-3-031-01218-1, pp. 1-88 - [j7]Per Larsen, Stefan Brunthaler, Michael Franz:
Automatic Software Diversity. IEEE Secur. Priv. 13(2): 30-37 (2015) - [c31]Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen:
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? AsiaCCS 2015: 55-61 - [c30]Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz:
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks. CCS 2015: 243-255 - [c29]Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi:
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks. CCS 2015: 952-963 - [c28]Liviu Codrut Stancu, Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Safe and efficient hybrid memory management for Java. ISMM 2015: 81-92 - [c27]Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. NDSS 2015 - [c26]Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz:
Opaque Control-Flow Integrity. NDSS 2015 - [c25]Gülfem Savrun-Yeniçeri, Michael L. Van de Vanter, Per Larsen, Stefan Brunthaler, Michael Franz:
An Efficient and Generic Event-based Profiler Framework for Dynamic Languages. PPPJ 2015: 102-112 - [c24]Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz:
Readactor: Practical Code Randomization Resilient to Memory Disclosure. IEEE Symposium on Security and Privacy 2015: 763-780 - 2014
- [j6]Per Larsen, Stefan Brunthaler, Michael Franz:
Security through Diversity: Are We There Yet? IEEE Secur. Priv. 12(2): 28-35 (2014) - [j5]Rasmus R. Jensen, Signe S. Thorup, Rasmus R. Paulsen, Tron A. Darvann, Nuno V. Hermann, Per Larsen, Sven Kreiborg, Rasmus Larsen:
Genus zero graph segmentation: Estimation of intracranial volume. Pattern Recognit. Lett. 49: 259-263 (2014) - [j4]Gülfem Savrun-Yeniçeri, Wei Zhang, Huahan Zhang, Eric Seckler, Chen Li, Stefan Brunthaler, Per Larsen, Michael Franz:
Efficient hosted interpreters on the JVM. ACM Trans. Archit. Code Optim. 11(1): 9:1-9:24 (2014) - [c23]Mark Murphy, Per Larsen, Stefan Brunthaler, Michael Franz:
Software Profiling Options and Their Effects on Security Based Diversification. MTD@CCS 2014: 87-96 - [c22]Wei Zhang, Per Larsen, Stefan Brunthaler, Michael Franz:
Accelerating iterators in optimizing AST interpreters. OOPSLA 2014: 727-743 - [c21]Liviu Codrut Stancu, Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Comparing points-to static analysis with runtime recorded profiling data. PPPJ 2014: 157-168 - [c20]Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz:
SoK: Automated Software Diversity. IEEE Symposium on Security and Privacy 2014: 276-291 - [i1]Mathias Payer, Stephen Crane, Per Larsen, Stefan Brunthaler, Richard Wartell, Michael Franz:
Similarity-based matching meets Malware Diversity. CoRR abs/1409.7760 (2014) - 2013
- [j3]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
Information flow tracking meets just-in-time compilation. ACM Trans. Archit. Code Optim. 10(4): 38:1-38:25 (2013) - [c19]Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Librando: transparent code randomization for just-in-time compilers. CCS 2013: 993-1004 - [c18]Andrei Homescu, Steven Neisius, Per Larsen, Stefan Brunthaler, Michael Franz:
Profile-guided automated software diversity. CGO 2013: 23:1-23:11 - [c17]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
CrowdFlow: Efficient Information Flow Security. ISC 2013: 321-337 - [c16]Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:
Booby trapping software. NSPW 2013: 95-106 - [c15]Gülfem Savrun-Yeniçeri, Wei Zhang, Huahan Zhang, Chen Li, Stefan Brunthaler, Per Larsen, Michael Franz:
Efficient interpreter optimizations for the JVM. PPPJ 2013: 113-123 - [c14]Rasmus R. Jensen, Signe S. Thorup, Rasmus R. Paulsen, Tron A. Darvann, Nuno V. Hermann, Per Larsen, Sven Kreiborg, Rasmus Larsen:
Genus Zero Graph Segmentation: Estimation of Intracranial Volume. SCIA 2013: 290-298 - [c13]Eric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz:
First-Class Labels: Using Information Flow to Debug Security Holes. TRUST 2013: 151-168 - [c12]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
Towards Precise and Efficient Information Flow Control in Web Browsers. TRUST 2013: 187-195 - [p1]Todd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:
Diversifying the Software Stack Using Randomized NOP Insertion. Moving Target Defense 2013: 151-173 - 2012
- [c11]Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Fine-grained modularity and reuse of virtual machine components. AOSD 2012: 203-214 - [c10]Per Larsen, Razya Ladelsky, Jacob Lidman, Sally A. McKee, Sven Karlsson, Ayal Zaks:
Parallelizing more Loops with Compiler Guided Refactoring. ICPP 2012: 410-419 - [c9]Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, Michael Franz:
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. WOOT 2012: 64-76 - 2011
- [j2]Per Larsen, Sven Karlsson, Jan Madsen:
Expressing Coarse-Grain Dependencies Among Tasks in Shared Memory Programs. IEEE Trans. Ind. Informatics 7(4): 652-660 (2011) - [c8]Tron A. Darvann, Nuno V. Hermann, Sune Demant, Per Larsen, Hildur Ólafsdóttir, Signe S. Thorup, Marek Zak, Angelo B. Lipira, Alex A. Kane, Daniel Govier, Helena Schatz, Daniel Rueckert, Sven Kreiborg:
Automated quantification and analysis of facial asymmetry in children with arthritis in the temporomandibular joint. ISBI 2011: 1193-1196 - 2010
- [j1]Per Larsen:
Text Message Price Gouging: A Perfect Storm of Tacit Collusion. J. Telecommun. High Technol. Law 8(1): 217-242 (2010) - [c7]Tron A. Darvann, Nuno V. Hermann, Per Larsen, Hildur Ólafsdóttir, Izabella V. Hansen, Hanne D. Hove, Leif Christensen, Daniel Rueckert, Sven Kreiborg:
Automated quantification and analysis of mandibular asymmetry. ISBI 2010: 416-419
2000 – 2009
- 2009
- [c6]Per Larsen, Sven Karlsson, Jan Madsen:
Identifying Inter-task Communication in Shared Memory Programming Models. IWOMP 2009: 168-182 - 2007
- [c5]Michael Sass Hansen, Hildur Ólafsdóttir, Tron A. Darvann, Nuno V. Hermann, Estanislao Oubel, Rasmus Larsen, Bjarne K. Ersbøll, Alejandro F. Frangi, Per Larsen, Chad A. Perlyn, Gillian M. Morriss-Kay, Sven Kreiborg:
Estimation of Independent Non-Linear Deformation Modes for Analysis of Craniofacial Malformations in Crouzon Mice. ISBI 2007: 1296-1299 - [c4]Hildur Ólafsdóttir, Stéphanie Lanche, Tron A. Darvann, Nuno V. Hermann, Rasmus Larsen, Bjarne K. Ersbøll, Estanislao Oubel, Alejandro F. Frangi, Per Larsen, Chad A. Perlyn, Gillian M. Morriss-Kay, Sven Kreiborg:
A Point-Wise Quantification of Asymmetry Using Deformation Fields: Application to the Study of the Crouzon Mouse Model. MICCAI (2) 2007: 452-459 - [c3]Hildur Ólafsdóttir, Tron A. Darvann, Bjarne K. Ersbøll, Nuno V. Hermann, Estanislao Oubel, Rasmus Larsen, Alejandro F. Frangi, Per Larsen, Chad A. Perlyn, Gillian M. Morriss-Kay, Sven Kreiborg:
Craniofacial statistical deformation models of wild-type mice and Crouzon mice. Image Processing 2007: 65121C - [c2]Hildur Ólafsdóttir, Michael Sass Hansen, Karl Sjöstrand, Tron A. Darvann, Nuno V. Hermann, Estanislao Oubel, Bjarne K. Ersbøll, Rasmus Larsen, Alejandro F. Frangi, Per Larsen, Chad A. Perlyn, Gillian M. Morriss-Kay, Sven Kreiborg:
Sparse Statistical Deformation Model for the Analysis of Craniofacial Malformations in the Crouzon Mouse. SCIA 2007: 112-121 - [c1]Stéphanie Lanche, Tron A. Darvann, Hildur Ólafsdóttir, Nuno V. Hermann, Andrea E. Van Pelt, Daniel Govier, Marissa J. Tenenbaum, Sybill Naidoo, Per Larsen, Sven Kreiborg, Rasmus Larsen, Alex A. Kane:
A Statistical Model of Head Asymmetry in Infants with Deformational Plagiocephaly. SCIA 2007: 898-907
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint