Search

Your search keyword '"Cristiano Giuffrida"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Cristiano Giuffrida" Remove constraint Author: "Cristiano Giuffrida" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
47 results on '"Cristiano Giuffrida"'

Search Results

1. Enviral: Fuzzing the Environment for Evasive Malware Analysis

2. On the Effectiveness of Same-Domain Memory Deduplication

3. TRRespass

4. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

5. LeanSym: Efficient hybrid fuzzing through conservative constraint debloating

6. CrossTalk: Speculative data leaks across cores are real

7. SMASH: Synchronized many-sided rowhammer attacks from JavaScript

8. D2.5 Platform Integration

9. Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries

10. PIBE

11. CollabFuzz - A Framework for Collaborative Fuzzing

12. Speculative Probing:Hacking Blind in the Spectre Era

13. D3.3 API, Library and Security Primitives Implementation - Initial

14. NetCAT: Practical cache attacks from the network

15. BinRec: dynamic binary lifting and recompilation

16. ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures

17. VPS: Excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching

18. D3.2 Security, Safety and Validation Support Definition

19. SoK: Benchmarking Flaws in Systems Security

20. RIDL: Rogue In-Flight Data Load

21. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks

22. ProbeGuard

23. kMVX: Detecting Kernel Information Leaks with Multi-variant Execution

24. Type-After-Type

25. Are all citations worth the same? Valuing citations by the value of the citing items

26. Towards Automated Vulnerability Scanning of Network Servers

27. Delta Pointers

28. BinRec

29. Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU

30. SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities

31. Drammer: Deterministic Rowhammer attacks on mobile platforms

32. On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks

33. Automating Live Update for Generic Server Programs

34. A heuristic approach to author name disambiguation in bibliometrics databases for large-scale research assessments

35. Lightweight Memory Checkpointing

36. Speculative Memory Checkpointing

37. Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs

38. I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics

39. Practical Automated Vulnerability Monitoring Using Program State Invariants

40. KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware

41. MINIX 3: Status Report and Current Research

42. Bait your Hook: a Novel Detection Technique for Keyloggers

43. Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing

44. Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure

45. Practical Context-Sensitive CFI

46. StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries

Catalog

Books, media, physical & digital resources