Cristiano Giuffrida
Cristiano Giuffrida
Associate Professor, Vrije Universiteit Amsterdam
Verified email at cs.vu.nl - Homepage
Title
Cited by
Cited by
Year
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
3112017
Enhanced operating system security through efficient and fine-grained address space randomization
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the 21th USENIX conference on Security, 2012
2642012
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1892015
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1762016
A heuristic approach to author name disambiguation in bibliometrics databases for large‐scale research assessments
CA D'Angelo, C Giuffrida, G Abramo
Journal of the American Society for Information Science and Technology 62 (2 …, 2011
152*2011
Flip feng shui: Hammering a needle in the software stack
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
25th {USENIX} Security Symposium ({USENIX} Security 16), 1-18, 2016
1482016
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
1432017
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
1392016
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
1302016
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
C Giuffrida, K Majdanik, M Conti, H Bos
International Conference on Detection of Intrusions and Malware, and …, 2014
1202014
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
1052019
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
B Gras, K Razavi, H Bos, C Giuffrida
27th {USENIX} Security Symposium ({USENIX} Security 18), 955-972, 2018
1022018
StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
Symposium on Network and Distributed System Security (NDSS), 2015
822015
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th {USENIX} Security Symposium ({USENIX} Security 16), 121-138, 2016
762016
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
722016
Safe and automatic live update for operating systems
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the eighteenth international conference on Architectural …, 2013
722013
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 213-226, 2018
632018
No need to hide: Protecting safe regions on commodity hardware
K Koning, X Chen, H Bos, C Giuffrida, E Athanasopoulos
Proceedings of the Twelfth European Conference on Computer Systems, 437-452, 2017
612017
The dynamics of innocent flesh on the bone: Code reuse ten years later
V van der Veen, D Andriesse, M Stamatogiannakis, X Chen, H Bos, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
602017
Grand pwning unit: Accelerating microarchitectural attacks with the GPU
P Frigo, C Giuffrida, H Bos, K Razavi
2018 ieee symposium on security and privacy (sp), 195-210, 2018
562018
The system can't perform the operation now. Try again later.
Articles 1–20