Lucian Cojocar
Lucian Cojocar
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
4062017
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
2019 IEEE Symposium on Security and Privacy (SP), 55-71, 2019
522019
PIE: Parser identification in embedded systems
L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
232015
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu
2020 IEEE Symposium on Security and Privacy (SP), 712-728, 2020
192020
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
L Cojocar, K Papagiannopoulos, N Timmers
CARDIS 2017, 2017
162017
Off-the-shelf embedded devices as platforms for security research
L Cojocar, K Razavi, H Bos
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
132017
JTR: A Binary Solution for Switch-Case Recovery
L Cojocar, T Kroes, H Bos
International Symposium on Engineering Secure Software and Systems, 177-195, 2017
72017
Panopticon: A Complete In-DRAM Rowhammer Mitigation
T Bennett, S Saroiu, A Wolman, L Cojocar
Workshop on DRAM Security (DRAMSec), 2021
2021
Identification of susceptibility to induced charge leakage
S Saroiu, L Cojocar, A Wolman
US Patent 10,978,171, 2021
2021
Between a hard and soft place: The (in) secure interplay of hardware and software
L Cojocar
VU University, Amsterdam, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–10