2020 (2)
NetCAT: Practical Cache Attacks from the Network. Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2020. Intel Bounty Reward
NetCAT: Practical Cache Attacks from the Network [pdf]Paper   NetCAT: Practical Cache Attacks from the Network [link]Web   bibtex
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Gras, B.; Giuffrida, C.; Kurth, M.; Bos, H.; and Razavi, K. In NDSS, February 2020.
bibtex
  2019 (8)
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching. Pawlowski, A.; van der Veen, V.; Andriesse, D.; van der Kouwe, E.; Holz, T.; Giuffrida, C.; and Bos, H. In ACSAC, December 2019.
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching [pdf]Paper   bibtex
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. Hong, S.; Frigo, P.; Kaya, Y.; Giuffrida, C.; and Dumitras, T. In USENIX Security, August 2019.
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks [pdf]Paper   bibtex
SoK: Benchmarking Flaws in Systems Security. van der Kouwe, E.; Heiser, G.; Andriesse, D.; Bos, H.; and Giuffrida, C. In EuroS&P, June 2019.
SoK: Benchmarking Flaws in Systems Security [pdf]Paper   SoK: Benchmarking Flaws in Systems Security [pdf]Slides   SoK: Benchmarking Flaws in Systems Security [link]Web   bibtex
RIDL: Rogue In-flight Data Load. van Schaik, S.; Milburn, A.; Österlund, S.; Frigo, P.; Maisuradze, G.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2019. Intel Bounty Reward, Pwnie Award Nomination for Most Innovative Research, CSAW Best Paper Award Runner-up
RIDL: Rogue In-flight Data Load [pdf]Paper   RIDL: Rogue In-flight Data Load [link]Slides   RIDL: Rogue In-flight Data Load [link]Web   RIDL: Rogue In-flight Data Load [link]Code   bibtex
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. Cojocar, L.; Razavi, K.; Giuffrida, C.; and Bos, H. In S&P, May 2019. Best Practical Paper Award, Pwnie Award Nomination for Most Innovative Research
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [pdf]Paper   Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks [link]Web   bibtex
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution. Österlund, S.; Koning, K.; Olivier, P.; Barbalace, A.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [pdf]Paper   kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [link]Web   kMVX: Detecting Kernel Information Leaks with Multi-variant Execution [link]Code   bibtex
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations. Bhat, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In ASPLOS, April 2019.
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [pdf]Paper   ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [link]Web   ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [link]Code   bibtex
Are All Citations Worth the Same? Valuing Citations by the Value of the Citing Items. Giuffrida, C.; Abramo, G.; and D'Angelo, C. A. JOI. January 2019.
Are All Citations Worth the Same? Valuing Citations by the Value of the Citing Items [pdf]Paper   bibtex
  2018 (14)
On the Effectiveness of Code Normalization for Function Identification. Oikonomopoulos, A.; Vermeulen, R.; Giuffrida, C.; and Bos, H. In PRDC, December 2018.
On the Effectiveness of Code Normalization for Function Identification [pdf]Paper   On the Effectiveness of Code Normalization for Function Identification [link]Code   bibtex
TIFF: Using Input Type Inference To Improve Fuzzing. Jain, V.; Rawat, S.; Giuffrida, C.; and Bos, H. In ACSAC, December 2018.
TIFF: Using Input Type Inference To Improve Fuzzing [pdf]Paper   TIFF: Using Input Type Inference To Improve Fuzzing [link]Code   bibtex
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. van der Kouwe, E.; Kroes, T.; Ouwehand, C.; Bos, H.; and Giuffrida, C. In ACSAC, December 2018.
Type-After-Type: Practical and Complete Type-Safe Memory Reuse [pdf]Paper   Type-After-Type: Practical and Complete Type-Safe Memory Reuse [link]Code   bibtex
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery. Kroes, T.; Altinay, A.; Nash, J.; Na, Y.; Volckaert, S.; Bos, H.; Franz, M.; and Giuffrida, C. In FEAST, October 2018.
BinRec: Attack Surface Reduction Through Dynamic Binary Recovery [pdf]Paper   BinRec: Attack Surface Reduction Through Dynamic Binary Recovery [pdf]Slides   bibtex
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. Konoth, R. K.; Oliverio, M.; Tatar, A.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Razavi, K. In OSDI, October 2018.
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [pdf]Paper   ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks [link]Code   bibtex
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer. Tatar, A.; Giuffrida, C.; Bos, H.; and Razavi, K. In RAID, September 2018. Best Paper Award
Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [pdf]Paper   Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer [link]Code   bibtex
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. van Schaik, S.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX Security, August 2018.
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [pdf]Paper   Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [link]Web   Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think [link]Code   bibtex
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. Gras, B.; Razavi, K.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2018. Pwnie Award Nomination for Most Innovative Research
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [pdf]Paper   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [link]Web   Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks [link]Code   bibtex
Throwhammer: Rowhammer Attacks over the Network and Defenses. Tatar, A.; Konoth, R. K.; Athanasopoulos, E.; Giuffrida, C.; Bos, H.; and Razavi, K. In USENIX ATC, July 2018. Pwnie Award Nomination for Most Innovative Research
Throwhammer: Rowhammer Attacks over the Network and Defenses [pdf]Paper   Throwhammer: Rowhammer Attacks over the Network and Defenses [link]Web   Throwhammer: Rowhammer Attacks over the Network and Defenses [link]Code   bibtex
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K. In S&P, May 2018. Pwnie Award Nomination for Most Innovative Research
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [pdf]Paper   Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU [link]Web   bibtex
Delta Pointers: Buffer Overflow Checks Without the Checks. Kroes, T.; Koning, K.; van der Kouwe, E.; Bos, H.; and Giuffrida, C. In EuroSys, April 2018.
Delta Pointers: Buffer Overflow Checks Without the Checks [pdf]Paper   Delta Pointers: Buffer Overflow Checks Without the Checks [pdf]Slides   Delta Pointers: Buffer Overflow Checks Without the Checks [link]Code   bibtex
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Göktaş, E.; Kollenda, B.; Koppe, P.; Bosman, E.; Portokalidis, G.; Holz, T.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2018.
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [pdf]Paper   Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure [link]Web   bibtex
Towards Automated Vulnerability Scanning of Network Servers. Schagen, N.; Koen, K.; Bos, H.; and Giuffrida, C. In EuroSec, April 2018.
Towards Automated Vulnerability Scanning of Network Servers [pdf]Paper   bibtex
Benchmarking Crimes: An Emerging Threat in Systems Security. van der Kouwe, E.; Andriesse, D.; Bos, H.; Giuffrida, C.; and Heiser, G. Technical Report arXiv preprint arXiv:1801.02381, January 2018.
Benchmarking Crimes: An Emerging Threat in Systems Security [pdf]Paper   bibtex
  2017 (13)
Secure Page Fusion with VUsion. Oliverio, M.; Razavi, K.; Bos, H.; and Giuffrida, C. In SOSP, October 2017.
Secure Page Fusion with VUsion [pdf]Paper   Secure Page Fusion with VUsion [link]Web   Secure Page Fusion with VUsion [link]Code   bibtex
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. van der Veen, V.; Andriesse, D.; Stamatogiannakis, M.; Chen, X.; Bos, H.; and Giuffrida, C. In CCS, October 2017.
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [pdf]Paper   The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [link]Web   bibtex
Towards Automated Discovery of Crash-Resistant Primitives in Binaries. Kollenda, B.; Goktas, E.; Blazytko, T.; Koppe, P.; Gawlik, R.; Konoth, R. K.; Giuffrida, C.; Bos, H.; and Holz, T. In DSN, June 2017.
Towards Automated Discovery of Crash-Resistant Primitives in Binaries [pdf]Paper   Towards Automated Discovery of Crash-Resistant Primitives in Binaries [link]Web   bibtex
No Need to Hide: Protecting Safe Regions on Commodity Hardware. Koning, K.; Chen, X.; Bos, H.; Giuffrida, C.; and Athanasopoulos, E. In EuroSys, April 2017.
No Need to Hide: Protecting Safe Regions on Commodity Hardware [pdf]Paper   No Need to Hide: Protecting Safe Regions on Commodity Hardware [link]Web   No Need to Hide: Protecting Safe Regions on Commodity Hardware [link]Code   bibtex
Fast and Generic Metadata Management with Mid-Fat Pointers. Kroes, T.; Koning, K.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In EuroSec, April 2017.
Fast and Generic Metadata Management with Mid-Fat Pointers [pdf]Paper   Fast and Generic Metadata Management with Mid-Fat Pointers [link]Code   bibtex
DangSan: Scalable Use-after-free Detection. van der Kouwe, E.; Nigade, V.; and Giuffrida, C. In EuroSys, April 2017.
DangSan: Scalable Use-after-free Detection [pdf]Paper   DangSan: Scalable Use-after-free Detection [link]Code   bibtex
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. In EuroSec, April 2017.
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [pdf]Paper   RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches [link]Code   bibtex
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. Chen, X.; Bos, H.; and Giuffrida, C. In EuroS&P, April 2017.
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks [pdf]Paper   bibtex
ASLR on the Line: Practical Cache Attacks on the MMU. Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C. In NDSS, February 2017. Pwnie Award for Most Innovative Research, DCSR Paper Award
ASLR on the Line: Practical Cache Attacks on the MMU [pdf]Paper   ASLR on the Line: Practical Cache Attacks on the MMU [link]Web   bibtex
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. Milburn, A.; Bos, H.; and Giuffrida, C. In NDSS, February 2017.
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [pdf]Paper   SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities [link]Code   bibtex
MARX: Uncovering Class Hierarchies in C++ Programs. Pawlowski, A.; Contag, M.; van der Veen, V.; Ouwehand, C.; Holz, T.; Bos, H.; Athanasopoulos, E.; and Giuffrida, C. In NDSS, February 2017.
MARX: Uncovering Class Hierarchies in C++ Programs [pdf]Paper   MARX: Uncovering Class Hierarchies in C++ Programs [link]Code   bibtex
VUzzer: Application-aware Evolutionary Fuzzing. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; and Bos, H. In NDSS, February 2017.
VUzzer: Application-aware Evolutionary Fuzzing [pdf]Paper   VUzzer: Application-aware Evolutionary Fuzzing [link]Code   bibtex
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU. van Schaik, S.; Razavi, K.; Gras, B.; Bos, H.; and Giuffrida, C. Technical Report IR-CS-51, VU Amsterdam, February 2017.
Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU [pdf]Paper   bibtex
  2016 (20)
A NEaT Design for Reliable and Scalable Network Stacks. Hruby, T.; Giuffrida, C.; Sambuc, L.; Bos, H.; and Tanenbaum, A. S. In CoNext, December 2016.
A NEaT Design for Reliable and Scalable Network Stacks [pdf]Paper   bibtex
VTPin: Practical VTable Hijacking Protection for Binaries. Sarbinowski, P.; Kemerlis, V. P.; Giuffrida, C.; and Athanasopoulos, E. In ACSAC, December 2016.
VTPin: Practical VTable Hijacking Protection for Binaries [pdf]Paper   VTPin: Practical VTable Hijacking Protection for Binaries [link]Code   bibtex
Bypassing Clang's SafeStack for Fun and Profit. Goktas, E.; Oikonomopoulos, A.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Bypassing Clang's SafeStack for Fun and Profit [pdf]Paper   Bypassing Clang's SafeStack for Fun and Profit [link]Web   bibtex
Flip Feng Shui: Rowhammering the VM's Isolation. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In Black Hat Europe, November 2016.
Flip Feng Shui: Rowhammering the VM's Isolation [pdf]Paper   Flip Feng Shui: Rowhammering the VM's Isolation [link]Web   bibtex
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C. In CCS, October 2016. Pwnie Award for Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSR Paper Award
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [pdf]Paper   Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [link]Web   Drammer: Deterministic Rowhammer Attacks on Mobile Platforms [link]Code   bibtex
TypeSan: Practical Type Confusion Detection. Haller, I.; Yuseok, J.; Peng, H.; Payer, M.; Giuffrida, C.; Bos, H.; and van der Kouwe, E. In CCS, October 2016.
TypeSan: Practical Type Confusion Detection [pdf]Paper   TypeSan: Practical Type Confusion Detection [link]Code   bibtex
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging. Miraglia, A.; Vogt, D.; Bos, H.; Tanenbaum, A. S.; and Giuffrida, C. In ISSRE, October 2016.
Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [pdf]Paper   Peeking into the Past: Efficient Checkpoint-assisted Time-traveling Debugging [link]Code   bibtex
Undermining Information Hiding (And What to do About it). Goktas, E.; Gawlik, R.; Kollenda, B.; Athanasopoulos, E.; Portokalidis, G.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016.
Undermining Information Hiding (And What to do About it) [pdf]Paper   Undermining Information Hiding (And What to do About it) [link]Web   bibtex
Poking Holes in Information Hiding. Oikonomopoulos, A.; Athanasopoulos, E.; Bos, H.; and Giuffrida, C. In USENIX Security, August 2016.
Poking Holes in Information Hiding [pdf]Paper   Poking Holes in Information Hiding [link]Web   Poking Holes in Information Hiding [link]Code   bibtex
Flip Feng Shui: Hammering a Needle in the Software Stack. Razavi, K.; Gras, B.; Bosman, E.; Preneel, B.; Giuffrida, C.; and Bos, H. In USENIX Security, August 2016. Pwnie Award Nomination for Best Cryptographic Attack
Flip Feng Shui: Hammering a Needle in the Software Stack [pdf]Paper   Flip Feng Shui: Hammering a Needle in the Software Stack [link]Web   bibtex
Over the Edge: Silently Owning Windows 10's Secure Browser. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In Black Hat USA, July 2016.
Over the Edge: Silently Owning Windows 10's Secure Browser [pdf]Paper   bibtex
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems. Bhat, K.; Vogt, D.; van der Kouwe, E.; Gras, B.; Sambuc, L.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In DSN, June 2016. Best Paper Session
OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [pdf]Paper   OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems [link]Code   bibtex
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. Koning, K.; Bos, H.; and Giuffrida, C. In DSN, June 2016.
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [pdf]Paper   Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization [link]Code   bibtex
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C. In S&P, May 2016. Pwnie Award for Most Innovative Research
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf]Paper   Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [link]Web   bibtex
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. van der Veen, V.; Goktas, E.; Contag, M.; Pawlowski, A.; Chen, X.; Rawat, S.; Bos, H.; Holz, T.; Athanasopoulos, E.; and Giuffrida, C. In S&P, May 2016.
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [pdf]Paper   A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level [link]Code   bibtex
Slick: An Intrusion Detection System for Virtualized Storage Devices. Bacs, A.; Giuffrida, C.; Grill, B.; and Bos, H. In SAC, April 2016.
Slick: An Intrusion Detection System for Virtualized Storage Devices [pdf]Paper   bibtex
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening. Haller, I.; van der Kouwe, E.; Giuffrida, C.; and Bos, H. In EuroSec, April 2016.
METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening [pdf]Paper   bibtex
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. Stanciu, V.; Spolaor, R.; Conti, M.; and Giuffrida, C. In CODASPY, March 2016.
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks [pdf]Paper   bibtex
Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; Tamburrelli, G.; and Tanenbaum, A. S. TSE. January 2016.
Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
Binary Rejuvenation: Applications and Challenges. Oikonomopoulos, A.; Giuffrida, C.; Rawat, S.; and Bos, H. IEEE S&P Magazine, 14(1). January 2016.
Binary Rejuvenation: Applications and Challenges [pdf]Paper   bibtex
  2015 (5)
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. Chen, X.; Slowinska, A.; Andriesse, D.; Bos, H.; and Giuffrida, C. In NDSS, November 2015.
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries [pdf]Paper   bibtex
Practical Context-Sensitive CFI. van der Veen, V.; Andriesse, D.; Göktas, E.; Gras, B.; Sambuc, L.; Slowinska, A.; Bos, H.; and Giuffrida, C. In CCS, November 2015.
Practical Context-Sensitive CFI [pdf]Paper   Practical Context-Sensitive CFI [link]Web   Practical Context-Sensitive CFI [link]Code   bibtex
Lightweight Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In DSN, October 2015.
Lightweight Memory Checkpointing [pdf]Paper   bibtex
Speculative Memory Checkpointing. Vogt, D.; Miraglia, A.; Portokalidis, G.; Tanenbaum, A. S.; Bos, H.; and Giuffrida, C. In Middleware, October 2015.
Speculative Memory Checkpointing [pdf]Paper   bibtex
A Methodology to Efficiently Compare Operating System Stability. van der Kouwe, E.; Giuffrida, C.; Ghituletez, R.; and Tanenbaum, A. In HASE, September 2015.
A Methodology to Efficiently Compare Operating System Stability [pdf]Paper   bibtex
  2014 (6)
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs. Giuffrida, C.; Iorgulescu, C.; and Tanenbaum, A. S. In Middleware, October 2014.
Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs [pdf]Paper   bibtex
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics. Giuffrida, C.; Majdanik, K.; Conti, M.; and Bos, H. In DIMVA, September 2014.
I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [pdf]Paper   I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics [link]Code   bibtex
Evaluating Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. In HASE, September 2014. Best Paper Award
Evaluating Distortion in Fault Injection Experiments [pdf]Paper   bibtex
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. S. SQL, 24(1). September 2014.
Finding Fault with Fault Injection: An Empirical Exploration of Distortion in Fault Injection Experiments [link]Paper   bibtex
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments. van der Kouwe, E.; Giuffrida, C.; and Tanenbaum, A. In EDCC, September 2014.
On the Soundness of Silence: Investigating Silent Failures Using Fault Injection Experiments [pdf]Paper   bibtex
Safe and Automatic Live Update. Giuffrida, C. Ph.D. Thesis, VU Amsterdam, August 2014. EuroSys Roger Needham PhD Award, SIGOPS Dennis M. Ritchie Award
Safe and Automatic Live Update [pdf]Paper   bibtex
  2013 (6)
Safe and Automatic Live Update for Operating Systems. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In ASPLOS, December 2013.
Safe and Automatic Live Update for Operating Systems [pdf]Paper   Safe and Automatic Live Update for Operating Systems [link]Code   bibtex
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer. Giuffrida, C.; Iorgulescu, C.; Kuijsten, A.; and Tanenbaum, A. S. In LISA, October 2013. Best Student Paper Award
Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer [pdf]Paper   bibtex
Practical Automated Vulnerability Monitoring Using Program State Invariants. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S. In DSN, October 2013.
Practical Automated Vulnerability Monitoring Using Program State Invariants [pdf]Paper   bibtex
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In PRDC, September 2013.
EDFI: A Dependable Fault Injection Tool for Dependability Benchmarking Experiments [pdf]Paper   bibtex
Unprivileged Black-Box Detection of User-Space Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. TDSC, 10(1). September 2013.
Unprivileged Black-Box Detection of User-Space Keyloggers [pdf]Paper   bibtex
Techniques for Efficient In-Memory Checkpointing. Vogt, D.; Giuffrida, C.; Bos, H.; and Tanenbaum, A. S. In HotDep, September 2013.
Techniques for Efficient In-Memory Checkpointing [pdf]Paper   bibtex
  2012 (3)
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. Giuffrida, C.; Kuijsten, A.; and Tanenbaum, A. S. In USENIX Security, December 2012.
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [pdf]Paper   Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [link]Code   bibtex
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions. Giuffrida, C.; Ortolani, S.; and Crispo, B. In ASIACCS, September 2012.
Memoirs of a Browser: A Cross-browser Detection Model for Privacy-breaching Extensions [pdf]Paper   bibtex
Safe and Automated State Transfer for Secure and Reliable Live Update. Giuffrida, C.; and Tanenbaum, A. In HotSwUp, September 2012.
Safe and Automated State Transfer for Secure and Reliable Live Update [pdf]Paper   bibtex
  2011 (2)
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2011.
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-harvesting Malware [pdf]Paper   bibtex
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments. D'Angelo, C. A.; Giuffrida, C.; and Abramo, G. JASIST, 62(2). September 2011.
A Heuristic Approach to Author Name Disambiguation in Bibliometrics Databases for Large-scale Research Assessments [pdf]Paper   bibtex
  2010 (5)
Bait Your Hook: A Novel Detection Technique for Keyloggers. Ortolani, S.; Giuffrida, C.; and Crispo, B. In RAID, October 2010.
Bait Your Hook: A Novel Detection Technique for Keyloggers [pdf]Paper   bibtex
We Crashed, Now What?. Giuffrida, C.; Cavallaro, L.; and Tanenbaum, A. S In HotDep, September 2010.
We Crashed, Now What? [pdf]Paper   bibtex
MINIX 3: Status Report and Current Research. Tanenbaum, A. S.; Appuswamy, R.; Bos, H.; Cavallaro, L.; Giuffrida, C.; Hrubỳ, T.; Herder, J.; and van der Kouwe, E. ;login, 35(3). August 2010.
MINIX 3: Status Report and Current Research [pdf]Paper   MINIX 3: Status Report and Current Research [link]Web   MINIX 3: Status Report and Current Research [link]Code   bibtex
A Gossip-based Churn Estimator for Large Dynamic Networks. Giuffrida, C.; and Ortolani, S. In ASCI, August 2010.
A Gossip-based Churn Estimator for Large Dynamic Networks [pdf]Paper   bibtex
A Taxonomy of Live Updates. Giuffrida, C.; and Tanenbaum, A. S. In ASCI, August 2010.
A Taxonomy of Live Updates [pdf]Paper   bibtex
  2009 (2)
Cooperative Update: A New Model for Dependable Live Update. Giuffrida, C.; and Tanenbaum, A. S. In HotSwUp, September 2009.
Cooperative Update: A New Model for Dependable Live Update [pdf]Paper   bibtex
Prepare to Die: A New Paradigm for Live Update. Giuffrida, C.; and Tanenbaum, A. Technical Report VU Amsterdam, August 2009.
Prepare to Die: A New Paradigm for Live Update [pdf]Paper   bibtex