Lucian Cojocar
Lucian Cojocar
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
2322017
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
2019 IEEE Symposium on Security and Privacy (SP), 55-71, 2019
162019
PIE: Parser identification in embedded systems
L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
122015
Off-the-shelf embedded devices as platforms for security research
L Cojocar, K Razavi, H Bos
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
82017
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
L Cojocar, K Papagiannopoulos, N Timmers
CARDIS 2017, 2017
52017
JTR: A Binary Solution for Switch-Case Recovery
L Cojocar, T Kroes, H Bos
International Symposium on Engineering Secure Software and Systems, 177-195, 2017
32017
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu
arXiv preprint arXiv:2003.04498, 2020
2020
Between a hard and soft place: The (in) secure interplay of hardware and software
L Cojocar
2019
The system can't perform the operation now. Try again later.
Articles 1–8