Hans Liljestrand

Doctoral Candidate

Research outputs

  1. 2019
  2. Published

    Protecting the stack with PACed canaries

    Liljestrand, H., Gauhar, Z., Nyman, T., Ekberg, J-E. & Asokan, N., 27 Oct 2019, SysTEX ’19, October 27, 2019, Huntsville, ON, Canada. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Accepted/In press

    Exploitation Techniques and Defenses for Data-Oriented Attacks

    Cheng, L., Liljestrand, H., Ahmed, M. S., Nyman, T., Jaeger, T., Asokan, N. & Yao, D. D., 25 Sep 2019, (Accepted/In press) IEEE Secure Development Conference. IEEE, p. 114-128 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Published

    Late breaking results: Authenticated call stack

    Liljestrand, H., Nyman, T., Ekberg, J. E. & Asokan, N., 2 Jun 2019, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019. IEEE/ACM, 2 p. 223. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Published

    PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

    Liljestrand, H., Nyman, T., Wang, K., Chinea Perez, C., Ekberg, J-E. & Asokan, N., 2019, SEC'19 : Proceedings of the 28th USENIX Conference on Security Symposium . ACM, p. 177-194

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. 2018
  7. Published

    Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization

    Hosseinzadeh, S., Liljestrand, H., Leppanen, V. & Paverd, A., 15 Oct 2018, SysTEX '18: Proceedings of the 3rd Workshop on System Software for Trusted Execution. ACM, p. 42-47 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. Published

    Toward Linux kernel memory safety

    Reshetova, E., Liljestrand, H., Paverd, A. & Asokan, N., 19 Sep 2018, In : Software: Practice and Experience. 48, 12, p. 2237-2256

    Research output: Contribution to journalArticleScientificpeer-review

  9. 2017
  10. Published

    Implementing prover-side proximity verification for strengthening transparent authentication

    Juuti, M., Vaas, C., Liljestrand, H., Sluganovic, I., Asokan, N. & Martinovic, I., 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA: Demo Session. IEEE, p. 1-2

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. Published

    STASH: Securing transparent authentication schemes using prover-side proximity verification

    Juuti, M., Vaas, C., Sluganovic, I., Liljestrand, H., Asokan, N. & Martinovic, I., 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication and Networking (SECON), 12-14 June 2017, San Diego, CA, USA. IEEE, p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. 2016
  13. Published

    TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition

    Juuti, M., Vaas, C., Sluganovic, I., Liljestrand, H., Martinovic, I. & Asokan, N., 2016, 12 p. (ArXiv preprints).

    Research output: Working paperProfessional

ID: 4740717