206 results on '"Cristiano Giuffrida"'
Search Results
2. Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags.
3. Predictive Context-sensitive Fuzzing.
4. GhostRace: Exploiting and Mitigating Speculative Race Conditions.
5. InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
6. SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching.
7. Practical Data-Only Attack Generation.
8. Uncontained: Uncovering Container Confusion in the Linux Kernel.
9. FloatZone: Accelerating Memory Error Detection using the Floating Point Unit.
10. Triereme: Speeding up hybrid fuzzing through efficient query scheduling.
11. Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation.
12. Enviral: Fuzzing the Environment for Evasive Malware Analysis.
13. TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.
14. Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
15. Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.
16. Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots.
17. DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.
18. DangZero: Efficient Use-After-Free Detection via Direct Page Table Access.
19. On the effectiveness of same-domain memory deduplication.
20. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.
21. Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
22. Who's debugging the debuggers? exposing debug information bugs in optimized binaries.
23. PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination.
24. FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection.
25. Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks.
26. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
27. CrossTalk: Speculative Data Leaks Across Cores Are Real.
28. LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating.
29. Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization.
30. CollabFuzz: A Framework for Collaborative Fuzzing.
31. BinRec: dynamic binary lifting and recompilation.
32. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
33. ParmeSan: Sanitizer-guided Greybox Fuzzing.
34. TRRespass: Exploiting the Many Sides of Target Row Refresh.
35. : Practical Cache Attacks from the Network.
36. Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing.
37. Speculative Probing: Hacking Blind in the Spectre Era.
38. Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
39. ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations.
40. kMVX: Detecting Kernel Information Leaks with Multi-variant Execution.
41. SoK: Benchmarking Flaws in Systems Security.
42. Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
43. RIDL: Rogue In-Flight Data Load.
44. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
45. VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
46. ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
47. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
48. Towards Automated Vulnerability Scanning of Network Servers.
49. Delta pointers: buffer overflow checks without the checks.
50. On the Effectiveness of Code Normalization for Function Identification.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.