default search action
Stefan Brunthaler 0001
Person information
- affiliation: Bundeswehr University Munich, Germany
- affiliation (2016 - 2017): University of Paderborn, Germany
- affiliation (2011 - 2015): University of California Irvine, CA, USA
- affiliation (PhD 2011): TU Wien, Vienna, Austria
Other persons with the same name
- Stefan Brunthaler 0002 — Technical University of Berlin, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stijn Volckaert, Stefan Brunthaler:
GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. DIMVA 2024: 416-438 - [c31]Felix Berlakovich, Stefan Brunthaler:
Cross Module Quickening - The Curious Case of C Extensions. ECOOP 2024: 6:1-6:29 - [c30]Matthias Bernad, Stefan Brunthaler:
HOBBIT: Hashed OBject Based InTegrity. ECOOP 2024: 7:1-7:25 - [c29]Vasil Sarafov, David Markvica, Felix Berlakovich, Matthias Bernad, Stefan Brunthaler:
Understanding and Improving Coverage Tracking with AFL++ (Registered Report). FUZZING 2024: 80-89 - 2023
- [c28]Felix Berlakovich, Stefan Brunthaler:
R2C: AOCR-Resilient Diversity with Reactive and Reflective Camouflage. EuroSys 2023: 488-504 - 2021
- [c27]Martin Desharnais, Stefan Brunthaler:
Towards efficient and verified virtual machines for dynamic languages. CPP 2021: 61-75 - [i4]Stefan Brunthaler:
Multi-Level Quickening: Ten Years Later. CoRR abs/2109.02958 (2021)
2010 – 2019
- 2018
- [c26]Mohaned Qunaibit, Stefan Brunthaler, Yeoul Na, Stijn Volckaert, Michael Franz:
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization. ECOOP 2018: 16:1-16:29 - 2017
- [j8]Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, Mathias Payer:
Control-Flow Integrity: Precision, Security, and Performance. ACM Comput. Surv. 50(1): 16:1-16:33 (2017) - [j7]Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler, Per Larsen, Michael Franz:
Large-Scale Automated Software Diversity - Program Evolution Redux. IEEE Trans. Dependable Secur. Comput. 14(2): 158-171 (2017) - 2016
- [j6]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, Edgar R. Weippl:
Time is on my side: Steganography in filesystem metadata. Digit. Investig. 18 Supplement: S76-S86 (2016) - [j5]Gregor Wagner, Per Larsen, Stefan Brunthaler, Michael Franz:
Thinking Inside the Box: Compartmentalized Garbage Collection. ACM Trans. Program. Lang. Syst. 38(3): 9:1-9:37 (2016) - [c25]Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler:
Injecting CSP for Fun and Security. ICISSP 2016: 15-25 - [i3]Nathan Burow, Scott A. Carr, Stefan Brunthaler, Mathias Payer, Joseph Nash, Per Larsen, Michael Franz:
Control-Flow Integrity: Precision, Security, and Performance. CoRR abs/1602.04056 (2016) - 2015
- [b1]Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz:
Automated Software Diversity. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2015, ISBN 978-3-031-01218-1, pp. 1-88 - [j4]Per Larsen, Stefan Brunthaler, Michael Franz:
Automatic Software Diversity. IEEE Secur. Priv. 13(2): 30-37 (2015) - [c24]Liviu Codrut Stancu, Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Safe and efficient hybrid memory management for Java. ISMM 2015: 81-92 - [c23]Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. NDSS 2015 - [c22]Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz:
Opaque Control-Flow Integrity. NDSS 2015 - [c21]Gülfem Savrun-Yeniçeri, Michael L. Van de Vanter, Per Larsen, Stefan Brunthaler, Michael Franz:
An Efficient and Generic Event-based Profiler Framework for Dynamic Languages. PPPJ 2015: 102-112 - [c20]Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz:
Readactor: Practical Code Randomization Resilient to Memory Disclosure. IEEE Symposium on Security and Privacy 2015: 763-780 - 2014
- [j3]Per Larsen, Stefan Brunthaler, Michael Franz:
Security through Diversity: Are We There Yet? IEEE Secur. Priv. 12(2): 28-35 (2014) - [j2]Gülfem Savrun-Yeniçeri, Wei Zhang, Huahan Zhang, Eric Seckler, Chen Li, Stefan Brunthaler, Per Larsen, Michael Franz:
Efficient hosted interpreters on the JVM. ACM Trans. Archit. Code Optim. 11(1): 9:1-9:24 (2014) - [c19]Mark Murphy, Per Larsen, Stefan Brunthaler, Michael Franz:
Software Profiling Options and Their Effects on Security Based Diversification. MTD@CCS 2014: 87-96 - [c18]Wei Zhang, Per Larsen, Stefan Brunthaler, Michael Franz:
Accelerating iterators in optimizing AST interpreters. OOPSLA 2014: 727-743 - [c17]Liviu Codrut Stancu, Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Comparing points-to static analysis with runtime recorded profiling data. PPPJ 2014: 157-168 - [c16]Per Larsen, Andrei Homescu, Stefan Brunthaler, Michael Franz:
SoK: Automated Software Diversity. IEEE Symposium on Security and Privacy 2014: 276-291 - [i2]Mathias Payer, Stephen Crane, Per Larsen, Stefan Brunthaler, Richard Wartell, Michael Franz:
Similarity-based matching meets Malware Diversity. CoRR abs/1409.7760 (2014) - 2013
- [j1]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
Information flow tracking meets just-in-time compilation. ACM Trans. Archit. Code Optim. 10(4): 38:1-38:25 (2013) - [c15]Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Librando: transparent code randomization for just-in-time compilers. CCS 2013: 993-1004 - [c14]Andrei Homescu, Steven Neisius, Per Larsen, Stefan Brunthaler, Michael Franz:
Profile-guided automated software diversity. CGO 2013: 23:1-23:11 - [c13]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
CrowdFlow: Efficient Information Flow Security. ISC 2013: 321-337 - [c12]Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:
Booby trapping software. NSPW 2013: 95-106 - [c11]Christian Wimmer, Stefan Brunthaler:
ZipPy on truffle: a fast and simple implementation of python. SPLASH (Companion Volume) 2013: 17-18 - [c10]Gülfem Savrun-Yeniçeri, Wei Zhang, Huahan Zhang, Chen Li, Stefan Brunthaler, Per Larsen, Michael Franz:
Efficient interpreter optimizations for the JVM. PPPJ 2013: 113-123 - [c9]Eric Hennigan, Christoph Kerschbaumer, Stefan Brunthaler, Per Larsen, Michael Franz:
First-Class Labels: Using Information Flow to Debug Security Holes. TRUST 2013: 151-168 - [c8]Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
Towards Precise and Efficient Information Flow Control in Web Browsers. TRUST 2013: 187-195 - [p2]Todd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:
Diversifying the Software Stack Using Randomized NOP Insertion. Moving Target Defense 2013: 151-173 - [i1]Stefan Brunthaler:
Speculative Staging for Interpreter Optimization. CoRR abs/1310.2300 (2013) - 2012
- [c7]Christian Wimmer, Stefan Brunthaler, Per Larsen, Michael Franz:
Fine-grained modularity and reuse of virtual machine components. AOSD 2012: 203-214 - [c6]Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, Michael Franz:
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. WOOT 2012: 64-76 - 2011
- [c5]Stefan Brunthaler:
Interpreter Instruction Scheduling. CC 2011: 164-178 - [p1]Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal, Stefan Brunthaler, Christian Wimmer, Michael Franz:
Compiler-Generated Software Diversity. Moving Target Defense 2011: 77-98 - 2010
- [c4]Stefan Brunthaler:
Efficient interpretation using quickening. DLS 2010: 1-14 - [c3]Stefan Brunthaler:
Inline Caching Meets Quickening. ECOOP 2010: 429-451 - [c2]Stefan Brunthaler:
Efficient inline caching without dynamic translation. SAC 2010: 2155-2156
2000 – 2009
- 2009
- [c1]Stefan Brunthaler:
Virtual-Machine Abstraction and Optimization Techniques. BYTECODE@ETAPS 2009: 3-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint