Lucian Cojocar
Lucian Cojocar
Microsoft Research
Verified email at - Homepage
Cited by
Cited by
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
2019 IEEE Symposium on Security and Privacy (SP), 55-71, 2019
PIE: Parser identification in embedded systems
L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
L Cojocar, J Kim, M Patel, L Tsai, S Saroiu, A Wolman, O Mutlu
2020 IEEE Symposium on Security and Privacy (SP), 712-728, 2020
Instruction Duplication: Leaky and Not Too Fault-Tolerant!
L Cojocar, K Papagiannopoulos, N Timmers
CARDIS 2017, 2017
Off-the-shelf embedded devices as platforms for security research
L Cojocar, K Razavi, H Bos
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
JTR: A Binary Solution for Switch-Case Recovery
L Cojocar, T Kroes, H Bos
International Symposium on Engineering Secure Software and Systems, 177-195, 2017
Panopticon: A Complete In-DRAM Rowhammer Mitigation
T Bennett, S Saroiu, A Wolman, L Cojocar
Workshop on DRAM Security (DRAMSec), 2021
Identification of susceptibility to induced charge leakage
S Saroiu, L Cojocar, A Wolman
US Patent 10,978,171, 2021
Between a hard and soft place: The (in) secure interplay of hardware and software
L Cojocar
VU University, Amsterdam, 2019
The system can't perform the operation now. Try again later.
Articles 1–10