D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 4,916 110 World Ranking 9754 National Ranking 169

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Software

His scientific interests lie mostly in Computer security, Operating system, Exploit, Set and Context. His Computer security research is multidisciplinary, incorporating perspectives in Virtual machine, Overhead, Identification, Page fault and Memory footprint. His Exploit research is multidisciplinary, relying on both Privilege escalation, Android and x86.

His research integrates issues of Theoretical computer science, Parsing, Enhanced Data Rates for GSM Evolution, State and Fuzz testing in his study of Set. As part of one scientific family, Cristiano Giuffrida deals mainly with the area of Enhanced Data Rates for GSM Evolution, narrowing it down to issues related to the Control flow, and often Software. He has included themes like Embedded system and Authentication in his Software study.

His most cited work include:

  • VUzzer: Application-aware Evolutionary Fuzzing. (267 citations)
  • Enhanced operating system security through efficient and fine-grained address space randomization (199 citations)
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (168 citations)

What are the main themes of his work throughout his whole career to date?

Cristiano Giuffrida mostly deals with Computer security, Software, Distributed computing, Operating system and Embedded system. His research investigates the connection between Computer security and topics such as Address space that intersect with problems in Address space layout randomization and Isolation. The Software study combines topics in areas such as Property, Set and Pointer.

His Distributed computing research includes elements of Overhead, State, Kernel and Parallel computing. The study incorporates disciplines such as x86 and Reliability in addition to Embedded system. His research in Exploit focuses on subjects like Code, which are connected to Key.

He most often published in these fields:

  • Computer security (29.20%)
  • Software (23.89%)
  • Distributed computing (18.58%)

What were the highlights of his more recent work (between 2019-2021)?

  • Software (23.89%)
  • Programming language (4.42%)
  • Compiler (6.19%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Software, Programming language, Compiler, Fuzz testing and Computer security. To a larger extent, Cristiano Giuffrida studies Operating system with the aim of understanding Software. His Fuzz testing research incorporates themes from Set, Software engineering, Basic block and Code coverage.

His Computer security study combines topics in areas such as Dram and Speculative execution. His Code reuse research incorporates themes from Address space and Linux kernel. His research investigates the link between Address space and topics such as Translation lookaside buffer that cross with problems in Distributed computing.

Between 2019 and 2021, his most popular works were:

  • TRRespass: Exploiting the Many Sides of Target Row Refresh (29 citations)
  • Practical Cache Attacks from the Network (15 citations)
  • ParmeSan : Sanitizer-guided greybox fuzzing (13 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Software

Cristiano Giuffrida spends much of his time researching Embedded system, Computer security, Dram, Commodity and Side channel attack. The various areas that he examines in his Embedded system study include Multi-core processor, CPUID and x86.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

VUzzer: Application-aware Evolutionary Fuzzing.

Sanjay Rawat;Vivek Jain;Ashish Kumar;Lucian Cojocar.
network and distributed system security symposium (2017)

497 Citations

Enhanced operating system security through efficient and fine-grained address space randomization

Cristiano Giuffrida;Anton Kuijsten;Andrew S. Tanenbaum.
usenix security symposium (2012)

299 Citations

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Victor van der Veen;Yanick Fratantonio;Martina Lindorfer;Daniel Gruss.
computer and communications security (2016)

267 Citations

Practical Context-Sensitive CFI

Victor van der Veen;Dennis Andriesse;Enes Göktaş;Ben Gras.
computer and communications security (2015)

244 Citations

RIDL: Rogue In-Flight Data Load

Stephan van Schaik;Alyssa Milburn;Sebastian Osterlund;Pietro Frigo.
ieee symposium on security and privacy (2019)

235 Citations

ASLR on the Line: Practical Cache Attacks on the MMU.

Ben Gras;Kaveh Razavi;Erik Bosman;Herbert Bos.
network and distributed system security symposium (2017)

205 Citations

Flip Feng Shui: Hammering a Needle in the Software Stack

Kaveh Razavi;Ben Gras;Erik Bosman;Bart Preneel.
usenix security symposium (2016)

197 Citations

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector

Erik Bosman;Kaveh Razavi;Herbert Bos;Cristiano Giuffrida.
ieee symposium on security and privacy (2016)

188 Citations

Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks

Ben Gras;Kaveh Razavi;Herbert Bos;Cristiano Giuffrida.
usenix security symposium (2018)

182 Citations

A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level

Victor van der Veen;Enes Goktas;Moritz Contag;Andre Pawoloski.
ieee symposium on security and privacy (2016)

178 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Cristiano Giuffrida

Ciriaco Andrea D’Angelo

Ciriaco Andrea D’Angelo

University of Rome Tor Vergata

Publications: 109

Giovanni Abramo

Giovanni Abramo

National Research Council (CNR)

Publications: 100

Onur Mutlu

Onur Mutlu

ETH Zurich

Publications: 61

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 36

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 29

Mathias Payer

Mathias Payer

École Polytechnique Fédérale de Lausanne

Publications: 28

Taesoo Kim

Taesoo Kim

Georgia Institute of Technology

Publications: 27

Saugata Ghose

Saugata Ghose

University of Illinois at Urbana-Champaign

Publications: 26

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 22

Yuval Yarom

Yuval Yarom

University of Adelaide

Publications: 20

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 18

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 17

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 16

Michalis Polychronakis

Michalis Polychronakis

Stony Brook University

Publications: 16

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 14

Daniel Genkin

Daniel Genkin

University of Michigan–Ann Arbor

Publications: 14

Trending Scientists

Gustau Camps-Valls

Gustau Camps-Valls

University of Valencia

Mitchell Wand

Mitchell Wand

Northeastern University

Brian N. Bershad

Brian N. Bershad

University of Washington

César Hervás-Martínez

César Hervás-Martínez

University of Córdoba

Michael T. Pope

Michael T. Pope

Georgetown University

Vassya Bankova

Vassya Bankova

Bulgarian Academy of Sciences

Yanyao Jiang

Yanyao Jiang

University of Nevada, Reno

Karen Sermon

Karen Sermon

Vrije Universiteit Brussel

Junko Oshima

Junko Oshima

University of Washington

Peter Trontelj

Peter Trontelj

University of Ljubljana

Theodore T. Kozlowski

Theodore T. Kozlowski

University of California, Santa Barbara

Steven Constable

Steven Constable

University of California, San Diego

Jorge Mataix-Solera

Jorge Mataix-Solera

Miguel Hernandez University

Adam A. Scaife

Adam A. Scaife

Met Office

Edward Awh

Edward Awh

University of Chicago

Mark S. Marley

Mark S. Marley

University of Arizona

Something went wrong. Please try again later.