If you made any changes in Pure these will be visible here soon.

Personal profile

Ancillary activities

No ancillary activities

Ancillary activities are updated daily

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Data storage equipment Engineering & Materials Science
Dynamic mechanical analysis Engineering & Materials Science
Application programs Engineering & Materials Science
Needles Engineering & Materials Science
Hardware Engineering & Materials Science
Mobile devices Engineering & Materials Science
Dynamic random access storage Engineering & Materials Science
Personal computers Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2013 2018

  • 12 Conference contribution
  • 1 Chapter
  • 1 PhD Thesis - Research VU, graduation VU

GuardION: Practical mitigation of DMA-based rowhammer attacks on ARM

van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H. & Razavi, K. 1 Jan 2018 Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer/Verlag, p. 92-113 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic mechanical analysis
Application programs
Attack
Mobile devices
Dynamic random access storage

Off-the-shelf Embedded Devices as Platforms for Security Research

Cojocar, L., Razavi, K. & Bos, H. 2017 Proceedings of the 10th European Workshop on Systems Security - EuroSec'17. New York, New York, USA: ACM Press, p. 1-6 6 p. (Proceedings of the 10th European Workshop on Systems Security - EuroSec'17)

Research output: Chapter in Book/Report/Conference proceedingChapter

Hardware
Firmware
Programmable logic controllers
Experiments
Internet of things

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector

Bosman, E., Razavi, K., Bos, H. & Giuffrida, C. 16 Aug 2016 Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers, Inc., p. 987-1004 18 p. 7546546

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Entropy
Servers
Semantics
Virtual machine

Drammer: Deterministic Rowhammer attacks on mobile platforms

Van Der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K. & Giuffrida, C. 24 Oct 2016 CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 24-28-October-2016, p. 1675-1689 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Dynamic random access storage
Smartphones
Concretes
Hardware

Flip Feng Shui: Hammering a Needle in the Software Stack

Razavi, K., Gras, B., Bosman, E., Preneel, B., Giuffrida, C. & Bos, H. J. 2016 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Needles
Data storage equipment
Forging
Authentication
Computer hardware