His scientific interests lie mostly in Computer security, Operating system, Exploit, Set and Context. His Computer security research is multidisciplinary, incorporating perspectives in Virtual machine, Overhead, Identification, Page fault and Memory footprint. His Exploit research is multidisciplinary, relying on both Privilege escalation, Android and x86.
His research integrates issues of Theoretical computer science, Parsing, Enhanced Data Rates for GSM Evolution, State and Fuzz testing in his study of Set. As part of one scientific family, Cristiano Giuffrida deals mainly with the area of Enhanced Data Rates for GSM Evolution, narrowing it down to issues related to the Control flow, and often Software. He has included themes like Embedded system and Authentication in his Software study.
Cristiano Giuffrida mostly deals with Computer security, Software, Distributed computing, Operating system and Embedded system. His research investigates the connection between Computer security and topics such as Address space that intersect with problems in Address space layout randomization and Isolation. The Software study combines topics in areas such as Property, Set and Pointer.
His Distributed computing research includes elements of Overhead, State, Kernel and Parallel computing. The study incorporates disciplines such as x86 and Reliability in addition to Embedded system. His research in Exploit focuses on subjects like Code, which are connected to Key.
His primary areas of investigation include Software, Programming language, Compiler, Fuzz testing and Computer security. To a larger extent, Cristiano Giuffrida studies Operating system with the aim of understanding Software. His Fuzz testing research incorporates themes from Set, Software engineering, Basic block and Code coverage.
His Computer security study combines topics in areas such as Dram and Speculative execution. His Code reuse research incorporates themes from Address space and Linux kernel. His research investigates the link between Address space and topics such as Translation lookaside buffer that cross with problems in Distributed computing.
Cristiano Giuffrida spends much of his time researching Embedded system, Computer security, Dram, Commodity and Side channel attack. The various areas that he examines in his Embedded system study include Multi-core processor, CPUID and x86.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
VUzzer: Application-aware Evolutionary Fuzzing.
Sanjay Rawat;Vivek Jain;Ashish Kumar;Lucian Cojocar.
network and distributed system security symposium (2017)
Enhanced operating system security through efficient and fine-grained address space randomization
Cristiano Giuffrida;Anton Kuijsten;Andrew S. Tanenbaum.
usenix security symposium (2012)
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Victor van der Veen;Yanick Fratantonio;Martina Lindorfer;Daniel Gruss.
computer and communications security (2016)
Practical Context-Sensitive CFI
Victor van der Veen;Dennis Andriesse;Enes Göktaş;Ben Gras.
computer and communications security (2015)
RIDL: Rogue In-Flight Data Load
Stephan van Schaik;Alyssa Milburn;Sebastian Osterlund;Pietro Frigo.
ieee symposium on security and privacy (2019)
ASLR on the Line: Practical Cache Attacks on the MMU.
Ben Gras;Kaveh Razavi;Erik Bosman;Herbert Bos.
network and distributed system security symposium (2017)
Flip Feng Shui: Hammering a Needle in the Software Stack
Kaveh Razavi;Ben Gras;Erik Bosman;Bart Preneel.
usenix security symposium (2016)
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
Erik Bosman;Kaveh Razavi;Herbert Bos;Cristiano Giuffrida.
ieee symposium on security and privacy (2016)
Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks
Ben Gras;Kaveh Razavi;Herbert Bos;Cristiano Giuffrida.
usenix security symposium (2018)
A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level
Victor van der Veen;Enes Goktas;Moritz Contag;Andre Pawoloski.
ieee symposium on security and privacy (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Vrije Universiteit Amsterdam
Vrije Universiteit Amsterdam
Ruhr University Bochum
University of Trento
National Research Council (CNR)
University of Rome Tor Vergata
University of New South Wales
ETH Zurich
University of Padua
KU Leuven
University of Valencia
Northeastern University
University of Washington
University of Córdoba
Georgetown University
Bulgarian Academy of Sciences
University of Nevada, Reno
Vrije Universiteit Brussel
University of Washington
University of Ljubljana
University of California, Santa Barbara
University of California, San Diego
Miguel Hernandez University
Met Office
University of Chicago
University of Arizona