Munir Geden : Publications
-
[1]
RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks
Munir Geden and Kasper Rasmussen
In Computers & Security. 2023.
Details about RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks | BibTeX data for RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks | DOI (10.1016/j.cose.2023.103213)
-
[2]
Hardware−assisted Remote Attestation Design for Critical Embedded Systems
Munir Geden and Kasper Rasmussen
In IET Information Security. 2023.
Details about Hardware−assisted Remote Attestation Design for Critical Embedded Systems | BibTeX data for Hardware−assisted Remote Attestation Design for Critical Embedded Systems | DOI (10.1049/ise2.12113)
-
[3]
TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity
Munir Geden and Kasper Rasmussen
In The 19th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (TrustCom). December, 2020.
Details about TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity | BibTeX data for TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity | DOI (10.1109/TrustCom50675.2020.00035)
-
[4]
Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems
Munir Geden and Kasper Rasmussen
In 2019 17th International Conference on Privacy‚ Security and Trust (PST). IEEE. August, 2019.
Details about Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems | BibTeX data for Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems | DOI (10.1109/PST47121.2019.8949036)
-
[5]
Classification of Malware Families Based on Runtime Behaviour
Munir Geden and Jassim Happa
In 10th International Symposium on Cyberspace Safety and Security. Pages 33–48. Springer. October, 2018.
Details about Classification of Malware Families Based on Runtime Behaviour | BibTeX data for Classification of Malware Families Based on Runtime Behaviour | DOI (10.1007/978-3-030-01689-0_3)