Cristiano Giuffrida
Cristiano Giuffrida
Associate Professor, Vrije Universiteit Amsterdam
Verified email at - Homepage
Cited by
Cited by
Vuzzer: Application-aware evolutionary fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Enhanced operating system security through efficient and fine-grained address space randomization
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the 21th USENIX conference on Security, 2012
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
B Gras, K Razavi, H Bos, C Giuffrida
USENIX Security Symposium 216, 2018
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
Flip Feng Shui: Hammering a Needle in the Software Stack.
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
USENIX Security symposium 25, 1-18, 2016
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
A heuristic approach to author name disambiguation in bibliometrics databases for large‐scale research assessments
CA D'Angelo, C Giuffrida, G Abramo
Journal of the American Society for Information Science and Technology 62 (2 …, 2011
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
C Giuffrida, K Majdanik, M Conti, H Bos
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitras
USENIX Security Symposium, 497-514, 2019
No need to hide: Protecting safe regions on commodity hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
Grand pwning unit: Accelerating microarchitectural attacks with the GPU
P Frigo, C Giuffrida, H Bos, K Razavi
2018 IEEE Symposium on Security and Privacy (sp), 195-210, 2018
TRRespass: Exploiting the many sides of target row refresh
P Frigo, E Vannacc, H Hassan, V Van Der Veen, O Mutlu, C Giuffrida, ...
2020 IEEE Symposium on Security and Privacy (SP), 747-762, 2020
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 213-226, 2018
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
2019 IEEE Symposium on Security and Privacy (SP), 55-71, 2019
StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
Symposium on Network and Distributed System Security (NDSS), 2015
Poking Holes in Information Hiding.
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
USENIX Security Symposium, 121-138, 2016
The system can't perform the operation now. Try again later.
Articles 1–20