Nathan Burow
Nathan Burow
MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
Control-flow integrity: Precision, security, and performance
N Burow, SA Carr, J Nash, P Larsen, M Franz, S Brunthaler, M Payer
ACM Computing Surveys (CSUR) 50 (1), 1-33, 2017
SoK: Shining light on shadow stacks
N Burow, X Zhang, M Payer
2019 IEEE Symposium on Security and Privacy (SP), 985-999, 2019
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
S Dinesh, N Burow, D Xu, M Payer
2020 IEEE Symposium on Security and Privacy (SP), 128-142, 2020
CFIXX: Object Type Integrity for C++
N Burow, D McKee, SA Carr, M Payer
NDSS, 2018
CUP: Comprehensive User-Space Protection for C/C++
N Burow, D McKee, SA Carr, M Payer
AsiaCCS, 2018
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
Y Jeon, W Han, N Burow, M Payer
2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), 249-263, 2020
A risk assessment tool for advanced metering infrastructures
T Shawly, J Liu, N Burow, S Bagchi, R Berthier, RB Bobba
2014 IEEE International Conference on Smart Grid Communications …, 2014
Keeping Safe Rust Safe with Galeed
E Rivera, S Mergendahl, H Shrobe, H Okhravi, N Burow
Annual Computer Security Applications Conference, 824-836, 2021
Moving Target Defense Considerations in Real-Time Safety-and Mission-Critical Systems
N Burow, R Burrow, R Khazan, H Shrobe, BC Ward
Proceedings of the 7th ACM Workshop on Moving Target Defense, 81-89, 2020
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
C Spensky, A Machiry, N Burow, H Okhravi, R Housley, Z Gu, H Jamjoom, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Preventing Kernel Hacks with HAKC
D McKee, Y Giannaris, CO Perez, H Shrobe, M Payer, H Okhravi, ...
Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022
Cross-Language Attacks
S Mergendahl, N Burow, H Okhravi
Proceedings 2022 Network and Distributed System Security Symposium. NDSS 22 …, 2022
One Giant Leap for Computer Security
H Okhravi, N Burow, R Skowyra, B Ward, S Jero, R Khazan, H Shrobe
IEEE Security & Privacy, 2020
Code Specialization through Dynamic Feature Observation
P Biswas, N Burow, M Payer
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework
D McKee, N Burow, M Payer
arXiv preprint arXiv:1906.02928, 2019
Security Considerations for Next-Generation Operating Systems for Cyber-Physical Systems
BC Ward, R Skowyra, S Jero, N Burow, H Okhravi, H Shrobe, R Khazan
MIT Lincoln Laboratory, 2019
TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems
C Nord, S Caspin, CE Nemitz, H Shrobe, H Okhravi, JH Anderson, ...
2021 IEEE Real-Time Systems Symposium (RTSS), 469-481, 2021
Research Frontiers for Moving Target Defenses
N Burow
Proceedings of the 8th ACM Workshop on Moving Target Defense, 27-28, 2021
Taking Back Control: Closing the Gap Between C/C++ and Machine Semantics
NH Burow
Purdue University Graduate School, 2019
TAG: Tagged Architecture Guide
S Jero, N Burow, B Ward, R Skowyra, R Khazan, H Shrobe, H Okhravi
ACM Computing Surveys (CSUR), 0
The system can't perform the operation now. Try again later.
Articles 1–20