dr. Kaveh Razavi

dr.

20132020
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2020

  • 21 Conference contribution
  • 2 PhD Thesis - Research VU, graduation VU
2020

Throwhammer: Rowhammer attacks over the network and defenses

Tatar, A., Konoth, R. K., Giuffrida, C., Bos, H., Athanasopoulos, E. & Razavi, K., 1 Jan 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 213-225 13 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Data storage equipment
Packet networks
Dynamic random access storage
Websites
Servers
2019

Between a hard and soft place: The (in)secure interplay of hardware and software

Cojocar, L., 2019, 138 p.

Research output: PhD ThesisPhD Thesis - Research VU, graduation VUAcademic

Open Access
File

Exploiting correcting codes: On the effectiveness of ECC memory against rowhammer attacks

Cojocar, L., Razavi, K., Giuffrida, C. & Bos, H., 16 Sep 2019, 2019 IEEE Symposium on Security and Privacy, SP 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 55-71 17 p. 8835222. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Data storage equipment
Hardware
Engineers
Controllers

RIDL: Rogue in-flight data load

Van Schaik, S., Milburn, A., Osterlund, S., Frigo, P., Maisuradze, G., Razavi, K., Bos, H. & Giuffrida, C., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 88-105 18 p. 8835281. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Program processors
Reverse engineering
Surface mount technology
Data structures
Sustainable development
2018

Defeating software mitigations against rowhammer: A surgical precision hammer

Tatar, A., Giuffrida, C., Bos, H. & Razavi, K., 2018, Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (eds.). Springer/Verlag, p. 47-66 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11050).

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Hammers
Physical addresses
Hardware
Data storage equipment
Software

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU

Frigo, P., Giuffrida, C., Bos, H. & Razavi, K., 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 195-210 16 p. 8418604

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

File
Reverse engineering
Mobile phones
Particle accelerators
Program processors
Hardware

GuardION: Practical mitigation of DMA-based rowhammer attacks on ARM

van der Veen, V., Lindorfer, M., Fratantonio, Y., Padmanabha Pillai, H., Vigna, G., Kruegel, C., Bos, H. & Razavi, K., 2018, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings: 15th International Conference, DIMVA 2018 Saclay, France, June 28–29, 2018 Proceedings. Springer/Verlag, p. 92-113 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Dynamic mechanical analysis
Application programs
Attack
Dynamic random access storage
Mobile devices

Malicious management unit: Why stopping cache attacks in software is harder than you think

Van Schaik, S., Giuffrida, C., Bos, H. & Razavi, K., Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 937-954 18 p.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Program processors
Scalability
Momentum
Side channel attack

Translation leak-aside buffer: Defeating cache side-channel protections with TLB attacks

Gras, B., Razavi, K., Bos, H. & Giuffrida, C., Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 955-972 18 p.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Program processors
Hardware
Learning systems
Data storage equipment
Engineers
2017

Off-the-shelf embedded devices as platforms for security research

Cojocar, L., Razavi, K. & Bos, H., 2017, EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017. New York, NY: ACM Press, p. 1-6 6 p. 1

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Hardware
Firmware
Programmable logic controllers
Experiments
Internet of things

RevAnC: A framework for reverse engineering hardware page table caches

Van Schaik, S., Razavi, K., Gras, B., Bos, H. & Giuffrida, C., 23 Apr 2017, Proceedings of the Proceedings of the 10th European Workshop on Systems Security, EuroSec 2017, co-located with European Conference on Computer Systems, EuroSys 2017. Association for Computing Machinery, Inc, 3

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Memory management units
Reverse engineering
Hardware
Retrofitting
Data storage equipment
2016

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector

Bosman, E., Razavi, K., Bos, H. & Giuffrida, C., 16 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers, Inc., p. 987-1004 18 p. 7546546

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Data storage equipment
Entropy
Servers
Semantics
Virtual machine

Drammer: Deterministic Rowhammer attacks on mobile platforms

Van Der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C., Vigna, G., Bos, H., Razavi, K. & Giuffrida, C., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), Vol. 24-28-October-2016. p. 1675-1689 15 p.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Data storage equipment
Dynamic random access storage
Smartphones
Concretes
Hardware

Flip Feng Shui: Hammering a Needle in the Software Stack

Razavi, K., Gras, B., Bosman, E., Preneel, B., Giuffrida, C. & Bos, H. J., 2016, 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Needles
Data storage equipment
Forging
Authentication
Computer hardware

Flip Feng Shui: Rowhammering the VM's Isolation

Razavi, K., Gras, B. J., Bosman, E. J. C., Preneel, B., Giuffrida, C. & Bos, H. J., Nov 2016, Black Hat Europe.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Over the Edge: Silently Owning Windows 10's Secure Browser

Bosman, E. J. C., Razavi, K., Bos, H. J. & Giuffrida, C., Aug 2016, Black Hat USA 2016.

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

2015

Fast and scalable virtual machine deployment

Razavi, K., 2015, 160 p.

Research output: PhD ThesisPhD Thesis - Research VU, graduation VUAcademic

Open Access
File
Virtual machine

Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure

Razavi, K., Ion, A., Tato, G., Jeong, K., Figueiredo, R., Pierre, G. E. O. & Kielmann, T., 2015, International Conference on Cloud Engineering (IC2E 2015). IEEE

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds

Razavi, K., van der Kolk, G. & Kielmann, T., 2015, The 35th International Conference on Distributed Computing Systems (ICDCS 2015). IEEE

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Scaling VM Deployment in an Open Source Cloud Stack

Razavi, K., Costache, S. V., Gardiman, A., Verstoep, K. & Kielmann, T., 2015, Workshop on Scientific Cloud Computing (ScienceCloud) 2015. ACM

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

2014

Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes

Razavi, K., Ion, A. & Kielmann, T., 2014, HPDC’14, The 23rd International ACM Symposium on High Performance Parallel and Distributed Computing. ACM

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

2013

Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation

Razavi, K., Razorea, L. M. & Kielmann, T., 2013, Workshop on Dependability and Interoperability in Heterogeneous Clouds (DIHC13). Aachen, Germany: Springer

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Scalable Virtual Machine Deployment Using VM Image Caches

Razavi, K. & Kielmann, T., 2013, SC13, The International Conference for High-Performance Computing, Networking, Storage and Analysis. Denver, CO, USA: ACM, IEEE Computer Society

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review