generated by bibbase.org
  2025 (9)
McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis. Jattke, P., Marazzi, M., Solt, F., Wipfli, M., Gloor, S., & Razavi, K. In USENIX Security, August 2025.
McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis [pdf]Paper   McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis [link]URL   link   bibtex   38 downloads  
Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions. Rüegge, S., Wikner, J., & Razavi, K. In USENIX Security, August 2025. Intel Bounty Reward, BlackHat USA
Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions [pdf]Paper   Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions [link]URL   link   bibtex   194 downloads  
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection. Bölcskei, M., Solt, F., Ceesay-Seitz, K., & Razavi, K. In USENIX Security, August 2025. ETH medal
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection [pdf]Paper   Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection [link]URL   link   bibtex   310 downloads  
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands. de Ridder, F., Jattke, P., & Razavi, K. In USENIX Security, August 2025.
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands [pdf]Paper   Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands [link]URL   link   bibtex   193 downloads  
Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz. Solt, F., & Razavi, K. In USENIX Security, August 2025.
Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz [pdf]Paper   Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz [link]URL   link   bibtex   253 downloads  
Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging. Bölcskei, M., Jattke, P., Wikner, J., & Razavi, K. In EuroS&P, July 2025.
Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging [pdf]Paper   Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging [link]URL   link   bibtex   165 downloads  
Softhammer: Exploiting Rowhammer Bit Flips without Crashing. de Ridder, F., Jattke, P., & Razavi, K. In DRAMSec, June 2025.
Softhammer: Exploiting Rowhammer Bit Flips without Crashing [pdf]Paper   link   bibtex   1 download  
Breaking the Barrier: Post-Barrier Spectre Attacks. Wikner, J., & Razavi, K. In S&P, May 2025. Distinguished Paper Award, Google VRP Patch Rewards Program
Breaking the Barrier: Post-Barrier Spectre Attacks [pdf]Paper   Breaking the Barrier: Post-Barrier Spectre Attacks [link]URL   link   bibtex   253 downloads  
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory. Gloor, S., Jattke, P., & Razavi, K. In uASC, February 2025. Best Paper Award
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory [pdf]Paper   link   bibtex   45 downloads  
  2024 (8)
𝜇CFI: Formal Verification of Microarchitectural Control-flow Integrity. Ceesay-Seitz, K., Solt, F., & Razavi, K. In CCS, October 2024.
𝜇CFI: Formal Verification of Microarchitectural Control-flow Integrity [pdf]Paper   𝜇CFI: Formal Verification of Microarchitectural Control-flow Integrity [link]URL   link   bibtex   185 downloads  
HybriDIFT: Scalable Memory-Aware Dynamic Information Flow Tracking for Hardware. Solt, F., & Razavi, K. In ICCAD, October 2024.
HybriDIFT: Scalable Memory-Aware Dynamic Information Flow Tracking for Hardware [pdf]Paper   HybriDIFT: Scalable Memory-Aware Dynamic Information Flow Tracking for Hardware [link]URL   link   bibtex   74 downloads  
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms. Jattke, P., Wipfli, M., Solt, F., Marazzi, M., Bölcskei, M., & Razavi, K. In USENIX Security, August 2024. Award for the best BSc thesis
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms [pdf]Paper   ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms [link]URL   link   bibtex   209 downloads  
Cascade: CPU Fuzzing via Intricate Program Generation. Solt, F., Ceesay-Seitz, K., & Razavi, K. In USENIX Security, August 2024.
Cascade: CPU Fuzzing via Intricate Program Generation [pdf]Paper   Cascade: CPU Fuzzing via Intricate Program Generation [link]URL   link   bibtex   404 downloads  
SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations. Orosa, L., Rührmair, U., Giray Yağlikçi, A., Luo, H., Olgun, A., Jattke, P., Patel, M., Kim, J. S., Razavi, K., & Mutlu, O. IEEE Access. 2024.
SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations [pdf]Paper   link   bibtex   32 downloads  
PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. Marazzi, M., Jattke, P., Zibung, J., & Razavi, K. In DIMVA, July 2024.
PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location [pdf]Paper   PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location [link]URL   link   bibtex   78 downloads  
HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging. Marazzi, M., Sachsenweger, T., Solt, F., Zeng, P., Takashi, K., Yarema, M., & Razavi, K. In ISCA, July 2024. Nominated for the Best Paper Award
HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging [pdf]Paper   HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging [link]URL   link   bibtex   100 downloads  
RISC-H: Rowhammer Attacks on RISC-V. Marazzi, M., & Razavi, K. In DRAMSec, June 2024.
RISC-H: Rowhammer Attacks on RISC-V [pdf]Paper   link   bibtex   21 downloads  
  2023 (4)
Phantom: Exploiting Decoder-detectable Mispredictions. Wikner, J., Trujillo, D., & Razavi, K. In MICRO, October 2023. Best Paper Award, ETH medal
Phantom: Exploiting Decoder-detectable Mispredictions [pdf]Paper   Phantom: Exploiting Decoder-detectable Mispredictions [link]URL   link   bibtex   340 downloads  
Inception: Exposing New Attack Surfaces with Training in Transient Execution. Trujillo, D., Wikner, J., & Razavi, K. In USENIX Security, August 2023. ETH medal
Inception: Exposing New Attack Surfaces with Training in Transient Execution [pdf]Paper   Inception: Exposing New Attack Surfaces with Training in Transient Execution [link]URL   link   bibtex   234 downloads  
BLASTER: Characterizing the Blast Radius of Rowhammer. Lang, Z., Jattke, P., Marazzi, M., & Razavi, K. In DRAMSec, June 2023. Award for the best BSc thesis
BLASTER: Characterizing the Blast Radius of Rowhammer [pdf]Paper   link   bibtex   68 downloads  
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. Marazzi, M., Solt, F., Jattke, P., Takashi, K., & Razavi, K. In S&P, May 2023. Patent pending
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations [pdf]Paper   REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations [link]URL   link   bibtex   168 downloads  
  2022 (8)
RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation. Solt, F., Jattke, P., & Razavi, K. In MICRO, October 2022.
RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation [pdf]Paper   RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation [link]URL   link   bibtex   74 downloads  
Retbleed: Arbitrary Speculative Code Execution with Return Instructions. Wikner, J., & Razavi, K. In USENIX Security, August 2022. Intel Bounty Reward, CSAW Europe finalist
Retbleed: Arbitrary Speculative Code Execution with Return Instructions [pdf]Paper   Retbleed: Arbitrary Speculative Code Execution with Return Instructions [link]URL   link   bibtex   133 downloads  
CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. Solt, F., Gras, B., & Razavi, K. In USENIX Security, August 2022. Patent pending
CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL [pdf]Paper   CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL [link]URL   link   bibtex   80 downloads  
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks. Wikner, J., Giuffrida, C., Bos, H., & Razavi, K. In WOOT, May 2022. Mozilla Bounty Reward
Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks [pdf]Paper   Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks [link]URL   link   bibtex   169 downloads  
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh. Marazzi, M., Jattke, P., Solt, F., & Razavi, K. In S&P, May 2022. Top Picks in Hardware and Embedded Security, ETH Spark Award Nomination, CSAW Europe finalist
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh [pdf]Paper   ProTRR: Principled yet Optimal In-DRAM Target Row Refresh [link]URL   link   bibtex   56 downloads  
Blacksmith: Scalable Rowhammering in the Frequency Domain. Jattke, P., van der Veen, V., Frigo, P., Gunter, S., & Razavi, K. In S&P, May 2022.
Blacksmith: Scalable Rowhammering in the Frequency Domain [pdf]Paper   Blacksmith: Scalable Rowhammering in the Frequency Domain [link]URL   link   bibtex   317 downloads  
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Johannesmeyer, B., Koschel, J., Razavi, K., Bos, H., & Giuffrida, C. In NDSS, April 2022.
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel [pdf]Paper   link   bibtex   593 downloads  
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. Bacs, A., Musaev, S., Razavi, K., Giuffrida, C., & Bos, H. In FAST, February 2022.
DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels [pdf]Paper   link   bibtex   142 downloads  
  2021 (4)
Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications. Hassan, H., Tugrul, Y. C., Kim, J. S., van der Veen, V., Razavi, K., & Mutlu, O. In MICRO, October 2021.
Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications [pdf]Paper   link   bibtex   15 downloads  
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. de Ridder, F., Frigo, P., Vannacci, E., Bos, H., Giuffrida, C., & Razavi, K. In USENIX Security, August 2021. Pwnie Nomination for the Most Underhyped Research
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript [pdf]Paper   SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript [link]URL   link   bibtex   862 downloads  
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations. Orosa, L., Wang, Y., Sadrosadati, M., Kim, J., Patel, M., Puddu, I., Luo, H. L., Razavi, K., Luna, J. G., Hassan, H., Ghiasi, N. M., Ghose, S., & Mutlu, O. In ISCA, June 2021.
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations [pdf]Paper   link   bibtex   4 downloads  
CrossTalk: Speculative Data Leaks Across Cores Are Real. Ragab, H., Milburn, A., Razavi, K., Bos, H., & Giuffrida, C. In S&P, May 2021. Intel Bounty Reward
CrossTalk: Speculative Data Leaks Across Cores Are Real [pdf]Paper   link   bibtex   565 downloads  
  2020 (9)
Speculative Probing: Hacking Blind in the Spectre Era. Goktas, E., Razavi, K., Portokalidis, G., Bos, H., & Giuffrida, C. In CCS, November 2020. Pwnie Award for the Most Innovative Research
Speculative Probing: Hacking Blind in the Spectre Era [pdf]Paper   link   bibtex   712 downloads  
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. Konoth, R. K., Fischer, B., Fokkink, W., Athanasopoulos, E., Razavi, K., & Bos, H. In EuroS&P, September 2020. Best Paper Award, US Patent App. 17/775,322
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions [pdf]Paper   link   bibtex   101 downloads  
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. Koschel, J., Giuffrida, C., Bos, H., & Razavi, K. In EuroS&P, September 2020.
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs [pdf]Paper   link   bibtex   50 downloads  
ParmeSan: Sanitizer-guided Greybox Fuzzing. Österlund, S., Razavi, K., Bos, H., & Giuffrida, C. In USENIX Security, August 2020.
ParmeSan: Sanitizer-guided Greybox Fuzzing [pdf]Paper   link   bibtex   81 downloads  
Leave my Apps Alone! A Study on how Android Developers Access Installed Apps on User’s Device. Scoccia, G. L., Kanj, I., Malavolta, I., & Razavi, K. In MOBILESOFT, July 2020. Best Paper Award
Leave my Apps Alone! A Study on how Android Developers Access Installed Apps on User’s Device [pdf]Paper   link   bibtex   9 downloads  
Stratus: Clouds with Microarchitectural Resource Management. Razavi, K., & Trivedi, A. In HotCloud, July 2020.
Stratus: Clouds with Microarchitectural Resource Management [pdf]Paper   link   bibtex   15 downloads  
TRRespass: Exploiting the Many Sides of Target Row Refresh. Frigo, P., Vannacci, E., Hassan, H., van der Veen, V., Mutlu, O., Giuffrida, C., Bos, H., & Razavi, K. In S&P, May 2020. Best Paper Award, Pwnie Award for the Most Innovative Research, Honorable Mention in IEEE MICRO Top Picks
TRRespass: Exploiting the Many Sides of Target Row Refresh [pdf]Paper   link   bibtex   988 downloads  
NetCAT: Practical Cache Attacks from the Network. Kurth, M., Gras, B., Andriesse, D., Giuffrida, C., Bos, H., & Razavi, K. In S&P, May 2020. Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research
NetCAT: Practical Cache Attacks from the Network [pdf]Paper   link   bibtex   400 downloads  
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Gras, B., Giuffrida, C., Kurth, M., Bos, H., & Razavi, K. In NDSS, February 2020.
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures [pdf]Paper   ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures [pdf]Slides   link   bibtex   70 downloads  
  2019 (2)
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. Cojocar, L., Razavi, K., Giuffrida, C., & Bos, H. In S&P, May 2019. Best Practical Paper Award, Pwnie Award Nomination for the Most Innovative Research
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Paper   Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Slides   link   bibtex   428 downloads  
RIDL: Rogue In-flight Data Load. van Schaik, S., Milburn, A., Österlund, S., Frigo, P., Maisuradze, G., Razavi, K., Bos, H., & Giuffrida, C. In S&P, May 2019. DCSRP Award, Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research, CSAW Best Paper Award Runner-up
RIDL: Rogue In-flight Data Load [pdf]Paper   RIDL: Rogue In-flight Data Load [link]Slides   RIDL: Rogue In-flight Data Load [link]Web   link   bibtex   120 downloads  
  2018 (7)
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. Konoth, R. K., Oliverio, M., Tatar, A., Andriesse, D., Bos, H., Giuffrida, C., & Razavi, K. In OSDI, October 2018. US Patent App. 16/059,357
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [pdf]Paper   link   bibtex   45 downloads  
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer. Tatar, A., Giuffrida, C., Bos, H., & Razavi, K. In RAID, September 2018. Best Paper Award
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [pdf]Paper   link   bibtex   50 downloads  
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. Gras, B., Razavi, K., Bos, H., & Giuffrida, C. In USENIX Security, August 2018. Pwnie Award Nomination for the Most Innovative Research
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [pdf]Paper   link   bibtex   519 downloads  
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. van Schaik, S., Giuffrida, C., Bos, H., & Razavi, K. In USENIX Security, August 2018.
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [pdf]Paper   link   bibtex   98 downloads  
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H., & Razavi, K. In DIMVA, June 2018. Pwnie Award Nomination for the Best Privilege Escalation Bug
GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM [pdf]Paper   link   bibtex   98 downloads  
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. Frigo, P., Giuffrida, C., Bos, H., & Razavi, K. In S&P, May 2018. Pwnie Award Nomination for the Most Innovative Research
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [pdf]Paper   link   bibtex   170 downloads  
Throwhammer: Rowhammer Attacks over the Network and Defenses. Tatar, A., Konoth, R. K., Athanasopoulos, E., Giuffrida, C., Bos, H., & Razavi, K. In USENIX ATC, July 2018. Pwnie Award Nomination for the Most Innovative Research
Throwhammer: Rowhammer Attacks over the Network and Defenses [pdf]Paper   link   bibtex   343 downloads  
  2017 (6)
Secure Page Fusion with VUsion. Oliverio, M., Razavi, K., Bos, H., & Giuffrida, C. In SOSP, October 2017.
Secure Page Fusion with VUsion [pdf]Paper   Secure Page Fusion with VUsion [link]Slides   Secure Page Fusion with VUsion [pdf]Poster   link   bibtex   85 downloads  
Understanding Rack-Scale Disaggregated Storage. Legtchenko, S., Williams, H., Razavi, K., Donnelly, A., Black, R., Douglas, A., Cheriere, N., Fryer, D., Mast, K., Brown, A. D., Klimovic, A., Slowey, A., & Rowstron, A. In HotStorage, July 2017.
Understanding Rack-Scale Disaggregated Storage [pdf]Paper   link   bibtex  
Off-the-shelf Embedded Devices as Platforms for Security Research. Cojocar, L., Razavi, K., & Bos, H. In EuroSec, April 2017.
Off-the-shelf Embedded Devices as Platforms for Security Research [pdf]Paper   link   bibtex   19 downloads  
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. van Schaik, S., Razavi, K., Gras, B., Bos, H., & Giuffrida, C. In EuroSec, April 2017.
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [pdf]Paper   link   bibtex   173 downloads  
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. van Schaik, S., Razavi, K., Gras, B., Bos, H., & Giuffrida, C. Technical Report IR-CS-51, VU Amsterdam, February 2017.
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU [pdf]Paper   link   bibtex   7 downloads  
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B., Razavi, K., Bosman, E., Bos, H., & Giuffrida, C. In NDSS, February 2017. Pwnie Award for the Most Innovative Research, DCSRP Award
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Slides   link   bibtex   309 downloads  
  2016 (5)
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K., Gras, B., Bosman, E., Preneel, B., Giuffrida, C., & Bos, H. In Black Hat Europe, November 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Paper   link   bibtex   77 downloads  
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K., & Giuffrida, C. In CCS, October 2016. Pwnie Award for the Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSRP Award
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   link   bibtex   250 downloads  
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K., Gras, B., Bosman, E., Preneel, B., Giuffrida, C., & Bos, H. In USENIX Security, August 2016. Pwnie Award Nomination for the Best Cryptographic Attack
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Slides   link   bibtex   132 downloads  
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E., Razavi, K., Bos, H., & Giuffrida, C. In Black Hat USA, July 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Paper   link   bibtex   52 downloads  
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E., Razavi, K., Bos, H., & Giuffrida, C. In S&P, May 2016. Pwnie Award for the Most Innovative Research
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   link   bibtex   112 downloads  
  2015 (6)
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds. Razavi, K., Kolk, G. V. D., & Kielmann, T. In ICDCS, October 2015.
Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds [pdf]Paper   link   bibtex   2 downloads  
CAIN: Silently Breaking ASLR in the Cloud. Barresi, A., Razavi, K., Payer, M., & Gross, T. R. In WOOT, August 2015.
CAIN: Silently Breaking ASLR in the Cloud [pdf]Paper   link   bibtex   9 downloads  
Fast and Scalable Virtual Machine Deployment. Razavi, K. Ph.D. Thesis, VU Amsterdam, August 2015. Nominated for the Roger Needham award
link   bibtex  
R2C2: A Network Stack for Rack-scale Computers. Costa, P., Ballani, H., Razavi, K., & Kash, I. In SIGCOMM, August 2015.
R2C2: A Network Stack for Rack-scale Computers [pdf]Paper   link   bibtex   2 downloads  
Scaling VM Deployment in an Open Source Cloud Stack. Razavi, K., Costache, S., Gardiman, A., Verstoep, K., & Kielmann, T. In ScienceCloud, June 2015.
Scaling VM Deployment in an Open Source Cloud Stack [pdf]Paper   link   bibtex  
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure. Razavi, K., Ion, A., Tato, G., Jeong, K., Figueiredo, R., Pierre, G., & Kielmann, T. In IC2E, March 2015.
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure [pdf]Paper   link   bibtex   1 download  
  2014 (1)
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes. Razavi, K., Ion, A., & Kielmann, T. In HPDC, June 2014.
Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes [pdf]Paper   link   bibtex   4 downloads  
  2013 (3)
Scalable Virtual Machine Deployment Using VM Image Caches. Razavi, K., & Kielmann, T. In SC, October 2013.
Scalable Virtual Machine Deployment Using VM Image Caches [pdf]Paper   link   bibtex   5 downloads  
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Razavi, K., Razorea, L. M., & Kielmann, T. In DIHC, September 2013.
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation [pdf]Paper   link   bibtex   4 downloads  
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications. Pierre, G., Kielmann, T., Rocca, E., Razavi, K, IJff, B., Fernandez, H., Figueiredo, R., Uta, A., Vintila, A., Oprescu, A., Schuett, T., Berlin, M., Artac, M., & Cernivec, A. In HPDC (poster), August 2013.
ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications [pdf]Paper   link   bibtex   4 downloads