Cristiano Giuffrida
Cristiano Giuffrida
Assistant Professor, Vrije Universiteit Amsterdam
Verified email at - Homepage
TitleCited byYear
Enhanced operating system security through efficient and fine-grained address space randomization
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the 21th USENIX conference on Security, 2012
VUzzer: Application-aware Evolutionary Fuzzing.
S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida, H Bos
NDSS 17, 1-14, 2017
A heuristic approach to author name disambiguation in bibliometrics databases for large‐scale research assessments
CA D'Angelo, C Giuffrida, G Abramo
Journal of the American Society for Information Science and Technology 62 (2 …, 2011
Practical context-sensitive CFI
V Van der Veen, D Andriesse, E Göktaş, B Gras, L Sambuc, A Slowinska, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Drammer: Deterministic rowhammer attacks on mobile platforms
V Van Der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Dedup est machina: Memory deduplication as an advanced exploitation vector
E Bosman, K Razavi, H Bos, C Giuffrida
2016 IEEE symposium on security and privacy (SP), 987-1004, 2016
Flip feng shui: Hammering a needle in the software stack
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
25th {USENIX} Security Symposium ({USENIX} Security 16), 1-18, 2016
I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics
C Giuffrida, K Majdanik, M Conti, H Bos
International Conference on Detection of Intrusions and Malware, and …, 2014
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
A tough call: Mitigating advanced code-reuse attacks at the binary level
V Van Der Veen, E Göktas, M Contag, A Pawoloski, X Chen, S Rawat, ...
2016 IEEE Symposium on Security and Privacy (SP), 934-953, 2016
StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
X Chen, A Slowinska, D Andriesse, H Bos, C Giuffrida
Symposium on Network and Distributed System Security (NDSS), 2015
Safe and automatic live update for operating systems
C Giuffrida, A Kuijsten, AS Tanenbaum
Proceedings of the eighteenth international conference on Architectural …, 2013
Poking holes in information hiding
A Oikonomopoulos, E Athanasopoulos, H Bos, C Giuffrida
25th {USENIX} Security Symposium ({USENIX} Security 16), 121-138, 2016
Undermining information hiding (and what to do about it)
E Göktaş, R Gawlik, B Kollenda, E Athanasopoulos, G Portokalidis, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 105-119, 2016
EDFI: A dependable fault injection tool for dependability benchmarking experiments
C Giuffrida, A Kuijsten, AS Tanenbaum
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
B Gras, K Razavi, H Bos, C Giuffrida
27th {USENIX} Security Symposium ({USENIX} Security 18), 955-972, 2018
We crashed, now what
C Giuffrida, L Cavallaro, AS Tanenbaum
Proceedings of the 6th Workshop on Hot Topics in System Dependability (Hot …, 2010
Bait your hook: a novel detection technique for keyloggers
S Ortolani, C Giuffrida, B Crispo
Recent Advances in Intrusion Detection, 198-217, 2010
Throwhammer: Rowhammer attacks over the network and defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 213-226, 2018
Typesan: Practical type confusion detection
I Haller, Y Jeon, H Peng, M Payer, C Giuffrida, H Bos, E Van Der Kouwe
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20