Cristiano Giuffrida
Cristiano Giuffrida
Associate Professor, Vrije Universiteit Amsterdam
Verified email at - Homepage
Cited by
Cited by
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
B Gras, K Razavi, H Bos, C Giuffrida
27th USENIX Security Symposium (USENIX Security 18), 955-972, 2018
Enhanced operating system security through efficient and fine-grained address space randomization
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the 21th USENIX conference on Security, 2012
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Flip feng shui: Hammering a needle in the software stack
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
25th USENIX Security Symposium (USENIX Security 16), 1-18, 2016
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
TRRespass: Exploiting the many sides of target row refresh
P Frigo, E Vannacc, H Hassan, V Van Der Veen, O Mutlu, C Giuffrida, ...
2020 IEEE Symposium on Security and Privacy (SP), 747-762, 2020
Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks
S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitraș
28th USENIX Security Symposium (USENIX Security 19), 497-514, 2019
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
2019 IEEE Symposium on Security and Privacy (SP), 55-71, 2019
A heuristic approach to author name disambiguation in bibliometrics databases for large‐scale research assessments
CA D'Angelo, C Giuffrida, G Abramo
Journal of the American Society for Information Science and Technology 62 (2 …, 2011
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 USENIX Annual Technical Conference (USENIX ATC 18), 213-226, 2018
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
C Giuffrida, K Majdanik, M Conti, H Bos
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
Grand pwning unit: Accelerating microarchitectural attacks with the GPU
P Frigo, C Giuffrida, H Bos, K Razavi
2018 ieee symposium on security and privacy (sp), 195-210, 2018
No need to hide: Protecting safe regions on commodity hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
{ParmeSan}: Sanitizer-guided greybox fuzzing
S Österlund, K Razavi, H Bos, C Giuffrida
29th USENIX Security Symposium (USENIX Security 20), 2289-2306, 2020
Crosstalk: Speculative data leaks across cores are real
H Ragab, A Milburn, K Razavi, H Bos, C Giuffrida
2021 IEEE Symposium on Security and Privacy (SP), 1852-1867, 2021
The system can't perform the operation now. Try again later.
Articles 1–20