Cristiano Giuffrida
Orcid: 0000-0002-8329-5929Affiliations:
- Vrije Universiteit Amsterdam, The Netherlands
According to our database1,
Cristiano Giuffrida
authored at least 121 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Proc. ACM Program. Lang., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 16th European Workshop on System Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 20th USENIX Conference on File and Storage Technologies, 2022
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Who's debugging the debuggers? exposing debug information bugs in optimized binaries.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
PIBE: practical kernel control-flow hardening with profile-guided indirect branch elimination.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
Who is Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Are all citations worth the same? Valuing citations by the value of the citing items.
J. Informetrics, 2019
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
CoRR, 2018
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
Proceedings of the 27th USENIX Security Symposium, 2018
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018
Proceedings of the 11th European Workshop on Systems Security, 2018
Proceedings of the Thirteenth EuroSys Conference, 2018
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
Proceedings of the Twelfth European Conference on Computer Systems, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the European Project Space on Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Finding fault with fault injection: an empirical exploration of distortion in fault injection experiments.
Softw. Qual. J., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
METAlloc: efficient and comprehensive metadata management for software security hardening.
Proceedings of the 9th European Workshop on System Security, 2016
Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 16th Annual Middleware Conference, Vancouver, BC, Canada, December 07, 2015
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 15th International Middleware Conference, 2014
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013
Proceedings of the Lucky LISA: Proceedings of the 27th Large Installation System Administration Conference, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013
2012
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 4th International Workshop on Hot Topics in Software Upgrades, 2012
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
A heuristic approach to author name disambiguation in bibliometrics databases for large-scale research assessments.
J. Assoc. Inf. Sci. Technol., 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010
2009
Proceedings of the 2nd ACM Workshop on Hot Topics in Software Upgrades, 2009