scispace - formally typeset
C

Cristiano Giuffrida

Researcher at VU University Amsterdam

Publications -  126
Citations -  5812

Cristiano Giuffrida is an academic researcher from VU University Amsterdam. The author has contributed to research in topics: Computer science & Fuzz testing. The author has an hindex of 33, co-authored 113 publications receiving 4156 citations. Previous affiliations of Cristiano Giuffrida include University of Amsterdam.

Papers
More filters
Proceedings ArticleDOI

VUzzer: Application-aware Evolutionary Fuzzing.

TL;DR: This paper presents an application - aware evolutionary fuzzing strategy that does not require any prior knowledge of the application or input format, and leverages control - and data - flow features based on static and dynamic analysis to infer fundamental prop - erties of the applications.
Proceedings ArticleDOI

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

TL;DR: It is shown that deterministic Rowhammer attacks are feasible on commodity mobile platforms and that they cannot be mitigated by current defenses, and the first Rowhammer-based Android root exploit is presented, relying on no software vulnerability, and requiring no user permissions.
Proceedings ArticleDOI

RIDL: Rogue In-Flight Data Load

TL;DR: Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and constrained attacks to leak arbitrary data across address spaces and privilege boundaries, which questions the sustainability of a per-variant, spot mitigation strategy and suggests more fundamental mitigations are needed to contain ever-emerging speculative execution attacks.
Proceedings Article

Enhanced operating system security through efficient and fine-grained address space randomization

TL;DR: This paper proposes the first design for fine-grained address space randomization (ASR) inside the operating system (OS), providing an efficient and comprehensive countermeasure against classic and emerging attacks, such as return-oriented programming.
Proceedings Article

Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks

TL;DR: It is shown for the first time that hardware translation lookaside buffers (TLBs) can be abused to leak fine-grained information about a victim's activity even when CPU cache activity is guarded by state-of-the-art cache side-channel protections, such as CAT and TSX.