Cristiano Giuffrida
Cristiano Giuffrida
Associate Professor, Vrije Universiteit Amsterdam
Adresse e-mail validée de cs.vu.nl - Page d'accueil
Titre
Citée par
Citée par
Année
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
3032017
Enhanced operating system security through efficient and fine-grained address space randomization
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the 21th USENIX conference on Security, 2012
2622012
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1812015
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1712016
A heuristic approach to author name disambiguation in bibliometrics databases for large‐scale research assessments
CA D'Angelo, C Giuffrida, G Abramo
Journal of the American Society for Information Science and Technology 62 (2 …, 2011
151*2011
Flip feng shui: Hammering a needle in the software stack
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
25th {USENIX} Security Symposium ({USENIX} Security 16), 1-18, 2016
1432016
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
1382017
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
1372016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
1222016
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
C Giuffrida, K Majdanik, M Conti, H Bos
International Conference on Detection of Intrusions and Malware, and …, 2014
1182014
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
B Gras, K Razavi, H Bos, C Giuffrida
27th {USENIX} Security Symposium ({USENIX} Security 18), 955-972, 2018
962018
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
942019
StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
Symposium on Network and Distributed System Security (NDSS), 2015
822015
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th {USENIX} Security Symposium ({USENIX} Security 16), 121-138, 2016
752016
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
712016
Safe and automatic live update for operating systems
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the eighteenth international conference on Architectural …, 2013
712013
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 213-226, 2018
622018
No need to hide: Protecting safe regions on commodity hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
602017
The dynamics of innocent flesh on the bone: Code reuse ten years later
V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
552017
TypeSan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
522016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20