generated by bibbase.org
  2024 (9)
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2. Wiebing, S.; de Faveri Tron, A.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2024.
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [pdf]Paper   InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [link]Web   InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 [link]Code   link   bibtex   98 downloads  
Practical Data-Only Attack Generation. Johannesmeyer, B.; Slowinska, A.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2024.
Practical Data-Only Attack Generation [pdf]Paper   Practical Data-Only Attack Generation [link]Code   link   bibtex   48 downloads  
GhostRace: Exploiting and Mitigating Speculative Race Conditions. Ragab, H.; Mambretti, A.; Kurmus, A.; and Giuffrida, C. In USENIX Security, August 2024.
GhostRace: Exploiting and Mitigating Speculative Race Conditions [pdf]Paper   GhostRace: Exploiting and Mitigating Speculative Race Conditions [link]Web   GhostRace: Exploiting and Mitigating Speculative Race Conditions [link]Code   link   bibtex   345 downloads  
SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching. Duta, V.; Aloserij, M.; and Giuffrida, C. In USENIX Security, August 2024.
link   bibtex  
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. Gorter, F.; Kroes, T.; Bos, H.; and Giuffrida, C. In S&P, May 2024.
link   bibtex  
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. Hertogh, M.; Wiebing, S.; and Giuffrida, C. In S&P, May 2024.
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation [pdf]Paper   Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation [link]Web   Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation [link]Code   link   bibtex   356 downloads  
Native BHI Vulnerability. Wiebing, S.; de Faveri Tron, A.; Bos, H.; and Giuffrida, C. April 2024. Affected vendors: Intel, Linux, Other SW Vendors
Native BHI Vulnerability [link]Web   Native BHI Vulnerability [link]CVE-2024-2201   link   bibtex   1 download  
GhostRace Vulnerability. Ragab, H.; Mambretti, A.; Kurmus, A.; and Giuffrida, C. March 2024. Affected vendors: All Major HW Vendors, Linux, Other SW Vendors
GhostRace Vulnerability [link]Web   GhostRace Vulnerability [link]CVE-2024-2193   GhostRace Vulnerability [link]CVE-2024-26602 (Linux)   link   bibtex  
Predictive Context-sensitive Fuzzing. Borrello, P.; Fioraldi, A.; D'Elia, D. C.; Balzarotti, D.; Querzoni, L.; and Giuffrida, C. In NDSS, February 2024.
Predictive Context-sensitive Fuzzing [pdf]Paper   Predictive Context-sensitive Fuzzing [link]Code   link   bibtex   43 downloads  
  2023 (19)
Exploiting Hardware from Software: An Attack Surface Analysis. Frigo, P. Ph.D. Thesis, VU Amsterdam, December 2023.
Exploiting Hardware from Software: An Attack Surface Analysis [pdf]Paper   link   bibtex  
Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling. Geretto, E.; Hohnerlein, J.; Giuffrida, C.; Bos, H.; Van Der Kouwe, E.; and von Gleissenthall, K. In ACSAC, December 2023.
Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling [pdf]Paper   Triereme: Speeding up Hybrid Fuzzing through Efficient Query Scheduling [link]Code   link   bibtex   21 downloads   Artifact Evaluation Badges:
FloatZone: How Floating Point Additions can Detect Memory Errors. Gorter, F.; Barberis, E.; Isemann, R.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. ;login:. November 2023.
FloatZone: How Floating Point Additions can Detect Memory Errors [link]Paper   link   bibtex   18 downloads  
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. Hertogh, M.; Wiesinger, M.; Österlund, S.; Muench, M.; Amit, N.; Bos, H.; and Giuffrida, C. In RAID, October 2023.
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation [pdf]Paper   Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation [link]Code   link   bibtex   52 downloads  
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions. Hofmann, J.; Vannacci, E.; Fournet, C.; Köpf, B.; and Oleksenko, O. In USENIX Security, August 2023.
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions [pdf]Paper   link   bibtex   23 downloads   Artifact Evaluation Badges:
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. Gorter, F.; Barberis, E.; Isemann, R.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2023.
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit [pdf]Paper   FloatZone: Accelerating Memory Error Detection using the Floating Point Unit [link]Code   link   bibtex   339 downloads   Artifact Evaluation Badges:
Uncontained: Uncovering Container Confusion in the Linux Kernel. Koschel, J.; Borrello, P.; D'Elia, D. C.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2023. Distinguished Artifact Award, Pwnie Award Nomination for Best Privilege Escalation
Uncontained: Uncovering Container Confusion in the Linux Kernel [pdf]Paper   Uncontained: Uncovering Container Confusion in the Linux Kernel [link]Web   Uncontained: Uncovering Container Confusion in the Linux Kernel [link]Code   link   bibtex   207 downloads   Artifact Evaluation Badges:
Uncontained Vulnerabilities. Koschel, J.; Borrello, P.; D'Elia, D. C.; Bos, H.; and Giuffrida, C. June 2023. Affected Vendors: Linux
Uncontained Vulnerabilities [link]Web   Uncontained Vulnerabilities [link]CVE-2023-1073   Uncontained Vulnerabilities [link]CVE-2023-1074   Uncontained Vulnerabilities [link]CVE-2023-1075   Uncontained Vulnerabilities [link]CVE-2023-1076   Uncontained Vulnerabilities [link]CVE-2023-1077   Uncontained Vulnerabilities [link]CVE-2023-1078   Uncontained Vulnerabilities [link]CVE-2023-1079   Uncontained Vulnerabilities [link]CVE-2023-25012   link   bibtex   202 downloads  
Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations. Isemann, R.; Giuffrida, C.; Bos, H.; Van Der Kouwe, E.; and von Gleissenthall, K. In PLDI, June 2023.
Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations [pdf]Paper   Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations [link]Code   link   bibtex   72 downloads   Artifact Evaluation Badges:
Enviral: Fuzzing the Environment for Evasive Malware Analysis. Gorter, F.; Giuffrida, C.; and van der Kouwe, E. In EuroSec, April 2023.
Enviral: Fuzzing the Environment for Evasive Malware Analysis [pdf]Paper   link   bibtex   53 downloads  
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. Di Dio, A.; Koning, K.; Bos, H.; and Giuffrida, C. In NDSS, February 2023.
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks [pdf]Paper   Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks [link]Code   link   bibtex   88 downloads  
Let Me Unwind That For You: Exceptions to Backward-Edge Protection. Duta, V.; Freyer, F.; Pagani, F.; Muench, M.; and Giuffrida, C. In NDSS, February 2023. Intel Bounty Reward
Let Me Unwind That For You: Exceptions to Backward-Edge Protection [pdf]Paper   Let Me Unwind That For You: Exceptions to Backward-Edge Protection [link]Code   link   bibtex   100 downloads  
CHOP Vulnerability. Duta, V.; Freyer, F.; Pagani, F.; Muench, M.; and Giuffrida, C. January 2023. Affected vendors: Intel
CHOP Vulnerability [link]CVE-2022-40196 (Intel)   link   bibtex  
P6: Prioritization for Prompt Patching of Programs with Pernicious Problems. 2023. NWO (6 Years)
P6: Prioritization for Prompt Patching of Programs with Pernicious Problems [link]Web   link   bibtex   9 downloads  
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. Wang, Z.; Mohr, G.; von Gleissenthall, K.; Reineke, J.; and Guarnieri, M. In CCS, 2023. Distinguished Paper Award
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts [pdf]Paper   link   bibtex   abstract   8 downloads  
Randomized Testing of Byzantine Fault Tolerant Algorithms. Winter, L.; Buse, F.; De Graaf, D.; v. Gleissenthall, K.; and Ozkan, B. K. In OOPSLA, 2023. Distinguished Paper Award
Randomized Testing of Byzantine Fault Tolerant Algorithms [pdf]Paper   link   bibtex   4 downloads  
RESCALE: Revolutionised Enhanced Supply Chain Automation with Limited Threats Exposure. 2023. Horizon 2020 (3 Years)
RESCALE: Revolutionised Enhanced Supply Chain Automation with Limited Threats Exposure [link]Web   link   bibtex   10 downloads  
Dutch Prize for ICT research. Giuffrida, C. 2023. NWO (1 Year)
link   bibtex  
Allocamelus: Secure Allocators and Hardware Fuzzers. 2023. Intel (Recurring)
Allocamelus: Secure Allocators and Hardware Fuzzers [link]Web   link   bibtex   5 downloads  
  2022 (21)
Unwinding the Stack for Fun and Profit. Duta, V.; Freyer, F.; Pagani, F.; Muench, M.; and Giuffrida, C. In Black Hat Europe, December 2022.
link   bibtex  
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. Geretto, E.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In ACSAC, December 2022.
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots [pdf]Paper   Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots [link]Code   link   bibtex   87 downloads   Artifact Evaluation Badges:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. de Faveri Tron, A.; Longari, S.; Carminati, M.; Polino, M.; and Zanero, S. In CCS, November 2022.
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks [pdf]Paper   CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks [link]Code   link   bibtex   47 downloads  
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. Gorter, F.; Koning, K.; Bos, H.; and Giuffrida, C. In CCS, November 2022.
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access [pdf]Paper   DangZero: Efficient Use-After-Free Detection via Direct Page Table Access [link]Code   link   bibtex   153 downloads  
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. Barberis, E.; Frigo, P.; Muench, M.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2022. Pwnie Award Nomination for Epic Achievement, Intel Bounty Reward
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [pdf]Paper   Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [link]Web   Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks [link]Code   link   bibtex   564 downloads   Artifact Evaluation Badges:
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. Tobias Scharnowski; Nils Bars; Moritz Schloegel; Eric Gustafson; Marius Muench; Giovanni Vigna; Christopher Kruegel; Thorsten Holz; and Ali Abbasi In USENIX Security, August 2022.
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing [pdf]Paper   link   bibtex   abstract   67 downloads   Artifact Evaluation Badges:
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. Tatar, A.; Trujillo, D.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2022.
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering [pdf]Paper   TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering [link]Code   link   bibtex   108 downloads   Artifact Evaluation Badges:
Side Channel Security Risks In Commodity Microarchitectures. Gras, B. Ph.D. Thesis, VU Amsterdam, June 2022. EuroSys Roger Needham PhD Award, William C. Carter PhD Dissertation Award
Side Channel Security Risks In Commodity Microarchitectures [pdf]Thesis   link   bibtex   3 downloads  
BugsBunny: Hopping to RTL Targets with a Directed Hardware-Design Fuzzer. Ragab, H.; Koning, K.; Bos, H.; and Giuffrida, C. In SILM, June 2022.
BugsBunny: Hopping to RTL Targets with a Directed Hardware-Design Fuzzer [pdf]Paper   link   bibtex   57 downloads  
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks. Wikner, J.; Giuffrida, C.; Bos, H.; and Razavi, K. In WOOT, May 2022. Mozilla Bounty Reward
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks [pdf]Paper   link   bibtex   129 downloads  
BLACKSMITH: Scalable Rowhammering in the Frequency Domain. Jattke, P.; van der Veen, V.; Frigo, P.; Gunter, S.; and Razavi, K. In S&P, May 2022.
BLACKSMITH: Scalable Rowhammering in the Frequency Domain [pdf]Paper   BLACKSMITH: Scalable Rowhammering in the Frequency Domain [link]Press   link   bibtex   289 downloads  
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation. Milburn, A.; van der Kouwe, E.; and Giuffrida, C. In S&P, May 2022.
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation [pdf]Paper   Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation [link]Code   link   bibtex   196 downloads  
On the Effectiveness of Same-Domain Memory Deduplication. Costi, A.; Johannesmeyer, B.; Bosman, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2022.
On the Effectiveness of Same-Domain Memory Deduplication [pdf]Paper   On the Effectiveness of Same-Domain Memory Deduplication [pdf]Slides   On the Effectiveness of Same-Domain Memory Deduplication [link]Web   On the Effectiveness of Same-Domain Memory Deduplication [link]Code   link   bibtex   57 downloads  
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Johannesmeyer, B.; Koschel, J.; Razavi, K.; Bos, H.; and Giuffrida, C. In NDSS, April 2022.
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Paper   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Slides   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Web   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Code   Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [link]Video   link   bibtex   510 downloads  
cISP: A Speed-of-Light Internet Service Provider. Bhattacherjee, D.; Aqeel, W.; Jyothi, S. A.; Bozkurt, I. N.; Sentosa, W.; Tirmazi, M.; Aguirre, A.; Chandrasekaran, B.; Godfrey, B.; Laughlin, G.; Maggs, B. M.; and Singla, A. In NSDI, April 2022.
link   bibtex  
BHI (or Spectre-BHB) Vulnerability. Barberis, E.; Frigo, P.; Muench, M.; Bos, H.; and Giuffrida, C. March 2022. Affected vendors: Intel (Bounty Reward), Arm, Other SW Vendors
BHI (or Spectre-BHB) Vulnerability [link]Web   BHI (or Spectre-BHB) Vulnerability [link]CVE-2022-0001 (Intel)   BHI (or Spectre-BHB) Vulnerability [link]CVE-2022-0002 (Intel)   BHI (or Spectre-BHB) Vulnerability [link]CVE-2022-23960 (Arm)   link   bibtex   1 download  
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. Bacs, A.; Musaev, S.; Razavi, K.; Giuffrida, C.; and Bos, H. In FAST, February 2022.
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels [pdf]Paper   link   bibtex   126 downloads  
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. Grant Hernandez; Marius Muench; Dominik Maier; Alyssa Milburn; Shinjo Park; Tobias Scharnowski; Tyler Tucker; Patrick Traynor; and Kevin R. B. Butler In NDSS, February 2022.
FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware [pdf]Paper   FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware [link]Code   link   bibtex   31 downloads  
EuroSys Jochen Liedtke Young Researcher Award. Giuffrida, C. 2022. RedHat (1 Year)
link   bibtex  
Memo: Efficient Fuzzing Through Memoization. 2022. EZK (4 Years)
link   bibtex  
VeriPatch: Safe and Automatic Patch Generation. 2022. EZK (4 Years)
link   bibtex  
  2021 (27)
Tardis: A fault-tolerant design for network control planes. Zhou, Z.; Benson, T. A.; Canini, M.; and Chandrasekaran, B. In SOSR, December 2021.
link   bibtex  
Selfish & Opaque Transaction Ordering in the Bitcoin Blockchain: The Case for Chain Neutrality. Messias, J.; Alzayat, M.; Chandrasekaran, B.; Gummadi, K. P.; Loiseau, P.; and Mislove, A. In IMC, November 2021.
link   bibtex  
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Borrello, P.; D'Elia, D. C.; Querzoni, L.; and Giuffrida, C. In CCS, November 2021.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization [pdf]Paper   Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization [link]Code   link   bibtex   92 downloads  
High-Fidelity Provenance: Exploring the Intersection of Provenance and Security. Stamatogiannakis, M. Ph.D. Thesis, VU Amsterdam, October 2021.
High-Fidelity Provenance: Exploring the Intersection of Provenance and Security [pdf]Thesis   link   bibtex  
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating. Mi, X.; Rawat, S.; Giuffrida, C.; and Bos, H. In RAID, October 2021.
LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating [pdf]Paper   link   bibtex   41 downloads  
Fault Injection as an Oscilloscope: Fault Correlation Analysis. Spruyt, A.; Milburn, A.; and Chmielewski, L. In CHES, September 2021.
Fault Injection as an Oscilloscope: Fault Correlation Analysis [pdf]Paper   link   bibtex  
Understanding the Security Implications of Kubernetes Networking. Minna, F.; Blaise, A.; Rebecchi, F.; Chandrasekaran, B.; and Massacci, F. . September 2021.
link   bibtex  
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks. Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2021. Distinguished Paper Award, Intel Bounty Reward, Mozilla Bounty Reward, Pwnie Award Nomination for Most Innovative Research, Pwnie Award Nomination for Best Privilege Escalation Bug, Pwnie Award Nomination for Best Client-Side Bug, Pwnie Award Nomination for Epic Achievement, DCSR Paper Award, CSAW Best Paper Award Runner-up
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [pdf]Paper   Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [link]Web   Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks [link]Code   link   bibtex   296 downloads  
Fine Grained Dataflow Tracking with Proximal Gradients. Ryan, G.; Shah, A.; She, D.; Bhat, K.; and Jana, S. In USENIX Security, August 2021.
Fine Grained Dataflow Tracking with Proximal Gradients [link]Paper   link   bibtex   34 downloads  
SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript. de Ridder, F.; Frigo, P.; Vannacci, E.; Bos, H.; Giuffrida, C.; and Razavi, K. In USENIX Security, August 2021. Pwnie Award Nomination for Most Under-Hyped Research, Best Faculty of Science Master Thesis Award
SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [pdf]Paper   SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [link]Web   SMASH: Synchronized Many-sided Rowhammer Attacks From JavaScript [link]Code   link   bibtex   794 downloads  
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time. Shi, E.; Aqeel, W.; Chandrasekaran, B.; and Maggs, B. M. In CRYPTO, August 2021.
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time [pdf]Paper   link   bibtex   3 downloads  
AnyOpt: Predicting and Optimizing IP Anycast Performance. Zhang, X.; Sen, T.; Zhang, Z.; April, T.; Chandrasekaran, B.; Choffnes, D.; Maggs, B. M.; Shen, H.; Sitaraman, R. K.; and Yang, X. In SIGCOMM, August 2021.
AnyOpt: Predicting and Optimizing IP Anycast Performance [pdf]Paper   link   bibtex   4 downloads  
MAD: Memory Allocation meets Software Diversity. Wiesinger, M.; Daniel, D.; and Stefan, B. In June 2021.
MAD: Memory Allocation meets Software Diversity [pdf]Paper   link   bibtex   9 downloads  
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection. Bhat, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In DSN, June 2021.
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection [pdf]Paper   FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection [link]Code   link   bibtex   50 downloads  
FPVI Vulnerability. Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C. June 2021. Affected vendors: Intel (Bounty Reward), AMD, Mozilla (Bounty Reward), Other SW Vendors
FPVI Vulnerability [link]Web   FPVI Vulnerability [link]CVE-2021-0086 (Intel)   FPVI Vulnerability [link]CVE-2021-26314 (AMD)   FPVI Vulnerability [link]CVE-2021-29955 (Mozilla)   link   bibtex   6 downloads  
SCSB Vulnerability. Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C. June 2021. Affected vendors: Intel (Bounty Reward), AMD, Xen, Other SW Vendors
SCSB Vulnerability [link]Web   SCSB Vulnerability [link]CVE-2021-0089 (Intel)   SCSB Vulnerability [link]CVE-2021-26313 (AMD)   link   bibtex  
CrossTalk: Speculative Data Leaks Across Cores Are Real. Ragab, H.; Milburn, A.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2021. Intel Bounty Reward
CrossTalk: Speculative Data Leaks Across Cores Are Real [pdf]Paper   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Web   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Code   CrossTalk: Speculative Data Leaks Across Cores Are Real [link]Press   link   bibtex   541 downloads  
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. Fasano, A.; Ballo, T.; Muench, M.; Leek, T.; Bulekov, A.; Dolan-Gavitt, B.; Egele, M.; Francillon, A.; Lu, L.; Gregory, N.; Balzarotti, D.; and Robertson, W. In ASIACCS, May 2021.
SoK: Enabling Security Analyses of Embedded Systems via Rehosting [link]Paper   doi   link   bibtex   abstract   21 downloads  
PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination. Duta, V.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In ASPLOS, April 2021.
PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination [pdf]Paper   PIBE: Practical Kernel Control-flow Hardening with Profile-guided Indirect Branch Elimination [link]Code   link   bibtex   11 downloads   Artifact Evaluation Badges:
CollabFuzz: A Framework for Collaborative Fuzzing. Österlund, S.; Geretto, E.; Jemmett, A.; Güler, E.; Görz, P.; Holz, T.; Giuffrida, C.; and Bos, H. In EuroSec, April 2021.
CollabFuzz: A Framework for Collaborative Fuzzing [pdf]Paper   CollabFuzz: A Framework for Collaborative Fuzzing [link]Code   link   bibtex   444 downloads  
Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries. Di Luna, G. A.; Italiano, D.; Massarelli, L.; Österlund, S.; Giuffrida, C.; and Querzoni, L. In ASPLOS, April 2021. Distinguished Paper Award
Who's Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries [pdf]Paper   link   bibtex   111 downloads   Artifact Evaluation Badges:
SoC Security Evaluation: Reflections on Methodology and Tooling. Corteggiani, N.; Camurati, G.; Muench, M.; Poeplau, S.; and Francillon, A. IEEE Design & Test, 38(1): 7–13. February 2021.
SoC Security Evaluation: Reflections on Methodology and Tooling [pdf]Paper   doi   link   bibtex   14 downloads  
Tricking Hardware into Efficiently Securing Software. Koning, K. Ph.D. Thesis, VU Amsterdam, January 2021.
Tricking Hardware into Efficiently Securing Software [pdf]Thesis   link   bibtex   8 downloads  
Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade. Vassena, M.; Disselkoen, C.; von Gleissenthall, K.; Cauligi, S.; Ghokan Kici, R.; Jhala, R.; Tullsen, D.; and Stefan, D. In POPL, January 2021. Distinguished Paper Award
Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade [pdf]Paper   Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade [link]Code   link   bibtex   20 downloads  
Solver-Aided Constant-Time Hardware Verification. von Gleissenthall, K.; Gökhan Kici, R.; Stefan, D.; and Jhala, R. In CCS, November 2021.
Solver-Aided Constant-Time Hardware Verification [pdf]Paper   link   bibtex   4 downloads  
Theseus: Making Patching Happen. 2021. NWO (5 Years)
Theseus: Making Patching Happen [link]Paper   link   bibtex   11 downloads  
Vulcan: Forging Vulnerable Code to Fight Fire with Fire. van der Kouwe, E. 2021. NWO Veni (3 Years)
link   bibtex  
  2020 (18)
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. Güler, E.; Görz, P.; Geretto, E.; Jemmett, A.; Österlund, S.; Bos, H.; Giuffrida, C.; and Holz, T. In ACSAC, December 2020.
Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing [pdf]Paper   Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing [link]Code   link   bibtex   69 downloads   Artifact Evaluation Badges:
Speculative Probing: Hacking Blind in the Spectre Era. Goktas, E.; Razavi, K.; Portokalidis, G.; Bos, H.; and Giuffrida, C. In CCS, November 2020. Pwnie Award for Most Innovative Research
Speculative Probing: Hacking Blind in the Spectre Era [pdf]Paper   Speculative Probing: Hacking Blind in the Spectre Era [link]Web   Speculative Probing: Hacking Blind in the Spectre Era [link]Code   Speculative Probing: Hacking Blind in the Spectre Era [link]Press   link   bibtex   672 downloads  
How to Keep Your Memory Safe and Your Software Fast. Kroes, T. Ph.D. Thesis, VU Amsterdam, September 2020.
How to Keep Your Memory Safe and Your Software Fast [link]Thesis   link   bibtex   8 downloads  
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. Konoth, R. K.; Fischer, B.; Fokkink, W.; Athanasopoulos, E.; Razavi, K.; and Bos, H. In EuroS&P, September 2020. Best Paper Award
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions [pdf]Paper   link   bibtex   92 downloads  
TagBleed: Breaking KASLR on the Isolated Kernel Address Space Using Tagged TLBs. Koschel, J.; Giuffrida, C.; Bos, H.; and Razavi, K. In EuroS&P, September 2020.
TagBleed: Breaking KASLR on the Isolated Kernel Address Space Using Tagged TLBs [pdf]Paper   link   bibtex   39 downloads  
ParmeSan: Sanitizer-guided Greybox Fuzzing. Österlund, S.; Razavi, K.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2020.
ParmeSan: Sanitizer-guided Greybox Fuzzing [pdf]Paper   ParmeSan: Sanitizer-guided Greybox Fuzzing [link]Code   link   bibtex   78 downloads  
Vulnerable by Design: Mitigating Design Flaws in Hardware and Software. Konoth, R. K. Ph.D. Thesis, VU Amsterdam, July 2020.
Vulnerable by Design: Mitigating Design Flaws in Hardware and Software [pdf]Thesis   link   bibtex   12 downloads  
Towards Constant-Time Foundations for the New Spectre Era. Cauligi, S.; Disselkoen, C.; von Gleissenthall, K.; Tullsen, D.; Stefan, D.; Rezk, T.; and Barthe, G. In PLDI, June 2020.
Towards Constant-Time Foundations for the New Spectre Era [pdf]Paper   Towards Constant-Time Foundations for the New Spectre Era [link]Code   link   bibtex   4 downloads  
SRBDS (CrossTalk) Vulnerability. Ragab, H.; Milburn, A.; Razavi, K.; Bos, H.; and Giuffrida, C. June 2020. Affected Vendors: Intel (Bounty Reward), SW Vendors
SRBDS (CrossTalk) Vulnerability [link]Web   SRBDS (CrossTalk) Vulnerability [link]CVE-2020-0543 (Intel)   link   bibtex   2 downloads  
NetCAT: Practical Cache Attacks from the Network. Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Intel Bounty Reward, Pwnie Award Nomination for Most Innovative Research
NetCAT: Practical Cache Attacks from the Network [pdf]Paper   NetCAT: Practical Cache Attacks from the Network [pdf]Slides   NetCAT: Practical Cache Attacks from the Network [link]Web   NetCAT: Practical Cache Attacks from the Network [link]Press   link   bibtex   367 downloads  
TRRespass: Exploiting the Many Sides of Target Row Refresh. Frigo, P.; Vannacci, E.; Hassan, H.; van der Veen, V.; Mutlu, O.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Best Paper Award, Pwnie Award for Most Innovative Research, IEEE Micro Top Picks Honorable Mention, DCSR Paper Award
TRRespass: Exploiting the Many Sides of Target Row Refresh [pdf]Paper   TRRespass: Exploiting the Many Sides of Target Row Refresh [pdf]Slides   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Web   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Code   TRRespass: Exploiting the Many Sides of Target Row Refresh [link]Press   link   bibtex   854 downloads  
Benchmarking Flaws Undermine Security Research. Van Der Kouwe, E.; Heiser, G.; Andriesse, D.; Bos, H.; and Giuffrida, C. IEEE S&P Magazine, 18(3): 48–57. May 2020.
Benchmarking Flaws Undermine Security Research [pdf]Paper   Benchmarking Flaws Undermine Security Research [link]Web   Benchmarking Flaws Undermine Security Research [link]Press   link   bibtex   12 downloads  
PANDAcap: A Framework for Streamlining Collection of Full-System Traces. Stamatogiannakis, M.; Bos, H.; and Groth, P. In EuroSec, April 2020.
PANDAcap: A Framework for Streamlining Collection of Full-System Traces [pdf]Paper   PANDAcap: A Framework for Streamlining Collection of Full-System Traces [pdf]Slides   PANDAcap: A Framework for Streamlining Collection of Full-System Traces [link]Code   link   bibtex   41 downloads  
BinRec: Dynamic Binary Lifting and Recompilation. Altinay, A.; Nash, J.; Kroes, T.; Rajasekaran, P.; Zhou, D.; Dabrowski, A.; Gens, D.; Na, Y.; Volckaert, S.; Giuffrida, C.; Bos, H.; and Franz, M. In EuroSys, April 2020.
BinRec: Dynamic Binary Lifting and Recompilation [pdf]Paper   BinRec: Dynamic Binary Lifting and Recompilation [link]Code   link   bibtex   88 downloads  
TRRespass Vulnerability. Frigo, P.; Vannacci, E.; Hassan, H.; van der Veen, V.; Mutlu, O.; Giuffrida, C.; Bos, H.; and Razavi, K. March 2020. Affected Vendors: Micron, Samsung, SK Hynix, SW Vendors
TRRespass Vulnerability [link]Web   TRRespass Vulnerability [link]CVE-2020-10255   link   bibtex  
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Gras, B.; Giuffrida, C.; Kurth, M.; Bos, H.; and Razavi, K. In NDSS, February 2020.
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures [pdf]Paper   link   bibtex   65 downloads  
Computing Device with Increased Resistance Against Rowhammer Attacks. Konoth, R. K.; Tatar, A.; Oliverio, M.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Razavi, K. January 2020.
Computing Device with Increased Resistance Against Rowhammer Attacks [link]Paper   link   bibtex   5 downloads  
VMware Early Career Faculty Grant. Giuffrida, C. 2020. VMWare (1 Year)
link   bibtex  
  2019 (6)
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. Pawlowski, A.; van der Veen, V.; Andriesse, D.; van der Kouwe, E.; Holz, T.; Giuffrida, C.; and Bos, H. In ACSAC, December 2019.
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching [pdf]Paper   link   bibtex   10 downloads  
When Memory Serves not so Well: Memory Errors 30 Years Late. van der Veen, V. Ph.D. Thesis, VU Amsterdam, October 2019. EuroSys Roger Needham PhD Award, SIGSAC Doctoral Dissertation Award, William C. Carter PhD Dissertation Award
When Memory Serves not so Well: Memory Errors 30 Years Late [pdf]Thesis   link   bibtex   2 downloads  
Between a Hard and a Soft Place: The (In)secure Interplay of Hardware and software. Cojocar, L. Ph.D. Thesis, VU Amsterdam, September 2019.
Between a Hard and a Soft Place: The (In)secure Interplay of Hardware and software [pdf]Thesis   link   bibtex  
NetCAT Vulnerability. Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K. September 2019. Affected Vendors: Intel (Bounty Reward), SW Vendors
NetCAT Vulnerability [link]Web   NetCAT Vulnerability [link]CVE-2019-11184   link   bibtex  
IODINE: Verifying Constant-Time Execution of Hardware. von Gleissenthall, K.; Gokhan Kici, R.; Stefan, D.; and Jhala, R. In USENIX Security, August 2019.
IODINE: Verifying Constant-Time Execution of Hardware [pdf]Paper   IODINE: Verifying Constant-Time Execution of Hardware [link]Code   IODINE: Verifying Constant-Time Execution of Hardware [pdf]Slides   link   bibtex   5 downloads  
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. Hong, S.; Frigo, P.; Kaya, Y.; Giuffrida, C.; and Dumitras, T. In USENIX Security, August 2019.
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks [pdf]Paper   link   bibtex   14 downloads