Enes Göktas wins the DCSR best paper Award
The paper is a product from the System Security group of the VU in Amsterdam and it is presented at ICT.OPEN 2015 by its primary author Enes Göktas.
“Out of Control: Overcoming Control-Flow Integrity” by Enes Göktas, Elias Athanasopoulos, Herbert Bos and Georgios Protokalidis is unanimously selected by the jury as excellent Dutch Cyber Security Research paper!
The paper is a product from the System Security group of the VU in Amsterdam and it is presented at ICT.OPEN 2015 by its primary author Enes Göktas. ‘Out of control; Overcoming Control-Flow Integrity’ was first published in May 2014 at the IEEE Symposium on Security & Privacy, one of the most important and prestigious venues in security research. The title nicely summarizes what the paper is about: the hijacking of the control flow. It demonstrates bypasses of several Control-Flow Integrity (CFI) implementations. In fact it was the first paper proving the limitations of state-of-the-art CFI implementations, in other words, it underlined the inefficacy of some countermeasures on very sophisticated forms of attack.
Bonus from IBM
Also a special bonus from IBM, a € 500 cheque for the team of authors responsible for the best cybersecurity paper, is personally presented to the primary author and speaker by IBM Director Security Software Europe, Johan Arts.
Three jury members, international well-respected professors in the cybersecurity research arena: Thorsten Holz (Germany), Frank Piessens (Belgium) and Danilo Bruschi (Italy) individually ranked and collectively decided on the quality of the papers for the Dutch Cyber Security Research Award (DCRSA). They were highly impressed by the research results coming from The Netherlands. During ICT.OPEN 2015 invited presenters received a signed certificate for their paper presentation. The Jury concluded ‘Out of Control: Overcoming Control-Flow Integrity’ as excellent paper. It has a very timely topic, with very high impact and already gave many opportunities for debate under researchers and follow-up research and papers. The paper became very influential, triggered many researchers around the world to search for better solutions which are able to stop attacks, that also become more and more sophisticated.