C
Cristiano Giuffrida
Researcher at VU University Amsterdam
Publications - 126
Citations - 5812
Cristiano Giuffrida is an academic researcher from VU University Amsterdam. The author has contributed to research in topics: Computer science & Fuzz testing. The author has an hindex of 33, co-authored 113 publications receiving 4156 citations. Previous affiliations of Cristiano Giuffrida include University of Amsterdam.
Papers
More filters
Proceedings ArticleDOI
VUzzer: Application-aware Evolutionary Fuzzing.
TL;DR: This paper presents an application - aware evolutionary fuzzing strategy that does not require any prior knowledge of the application or input format, and leverages control - and data - flow features based on static and dynamic analysis to infer fundamental prop - erties of the applications.
Proceedings ArticleDOI
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Victor van der Veen,Yanick Fratantonio,Martina Lindorfer,Daniel Gruss,Clémentine Maurice,Giovanni Vigna,Herbert Bos,Kaveh Razavi,Cristiano Giuffrida +8 more
TL;DR: It is shown that deterministic Rowhammer attacks are feasible on commodity mobile platforms and that they cannot be mitigated by current defenses, and the first Rowhammer-based Android root exploit is presented, relying on no software vulnerability, and requiring no user permissions.
Proceedings ArticleDOI
RIDL: Rogue In-Flight Data Load
Stephan van Schaik,Alyssa Milburn,Sebastian Österlund,Pietro Frigo,Giorgi Maisuradze,Kaveh Razavi,Herbert Bos,Cristiano Giuffrida +7 more
TL;DR: Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and constrained attacks to leak arbitrary data across address spaces and privilege boundaries, which questions the sustainability of a per-variant, spot mitigation strategy and suggests more fundamental mitigations are needed to contain ever-emerging speculative execution attacks.
Proceedings Article
Enhanced operating system security through efficient and fine-grained address space randomization
TL;DR: This paper proposes the first design for fine-grained address space randomization (ASR) inside the operating system (OS), providing an efficient and comprehensive countermeasure against classic and emerging attacks, such as return-oriented programming.
Proceedings Article
Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks
TL;DR: It is shown for the first time that hardware translation lookaside buffers (TLBs) can be abused to leak fine-grained information about a victim's activity even when CPU cache activity is guarded by state-of-the-art cache side-channel protections, such as CAT and TSX.