If you made any changes in Pure these will be visible here soon.

Personal profile

Ancillary activities

No ancillary activities

Ancillary activities are updated daily

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Data storage equipment Engineering & Materials Science
Hardware Engineering & Materials Science
Dynamic random access storage Engineering & Materials Science
Reverse engineering Engineering & Materials Science
Hammers Engineering & Materials Science
Dynamic mechanical analysis Engineering & Materials Science
Mobile phones Engineering & Materials Science
Application programs Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2018

  • 14 Conference contribution
  • 1 Chapter
  • 1 PhD Thesis - Research VU, graduation VU

Defeating software mitigations against rowhammer: A surgical precision hammer

Tatar, A., Giuffrida, C., Bos, H. & Razavi, K., 2018, Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer/Verlag, p. 47-66 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050)

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Hammers
Physical addresses
Hardware
Data storage equipment
Software

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU

Frigo, P., Giuffrida, C., Bos, H. & Razavi, K., 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 195-210 16 p. 8418604

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Reverse engineering
Mobile phones
Particle accelerators
Program processors
Hardware

GuardION: Practical mitigation of DMA-based rowhammer attacks on ARM

van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H. & Razavi, K., 2018, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings: 15th International Conference, DIMVA 2018 Saclay, France, June 28–29, 2018 Proceedings. Springer/Verlag, p. 92-113 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS)

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Dynamic mechanical analysis
Application programs
Attack
Mobile devices
Dynamic random access storage

Off-the-shelf Embedded Devices as Platforms for Security Research

Cojocar, L., Razavi, K. & Bos, H., 2017, Proceedings of the 10th European Workshop on Systems Security - EuroSec'17. New York, New York, USA: ACM Press, p. 1-6 6 p. (Proceedings of the 10th European Workshop on Systems Security - EuroSec'17)

Research output: Chapter in Book / Report / Conference proceedingChapterAcademicpeer-review

Hardware
Firmware
Programmable logic controllers
Experiments
Internet of things

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector

Bosman, E., Razavi, K., Bos, H. & Giuffrida, C., 16 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers, Inc., p. 987-1004 18 p. 7546546

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Data storage equipment
Entropy
Servers
Semantics
Virtual machine