Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Lucian Cojocar"'
Publikováno v:
2022 IEEE International Reliability Physics Symposium (IRPS).
Autor:
Onur Mutlu, Lillian Tsai, Stefan Saroiu, Lucian Cojocar, Minesh Patel, Jeremie S. Kim, Alec Wolman
Publikováno v:
IEEE Symposium on Security and Privacy
Cloud providers are concerned that Rowhammer poses a potentially critical threat to their servers, yet today they lack a systematic way to test whether the DRAM used in their servers is vulnerable to Rowhammer attacks. This paper presents an end-to-e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::86b7c70b0695a692a14b5a6973ddfe15
Publikováno v:
Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers, 160-179
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
STARTPAGE=160;ENDPAGE=179;TITLE=Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers
Cojocar, L, Papagiannopoulos, K & Timmers, N 2018, Instruction duplication : Leaky and not too fault-tolerant! in Smart Card Research and Advanced Applications-16th International Conference, CARDIS 2017,Revised Selected Papers . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10728 LNCS, Springer/Verlag, pp. 160-179, 16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017, Lugano, Switzerland, 13/11/17 . https://doi.org/10.1007/978-3-319-75208-2_10
Smart Card Research and Advanced Applications ISBN: 9783319752075
CARDIS
Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplic
Publikováno v:
IEEE Symposium on Security and Privacy
Cojocar, L, Razavi, K, Giuffrida, C & Bos, H 2019, Exploiting correcting codes : On the effectiveness of ECC memory against rowhammer attacks . in Proceedings-2019 IEEE Symposium on Security and Privacy (SP) : 19-23 May 2019 ., 8835222, Proceedings-IEEE Symposium on Security and Privacy, vol. 2019-May, Institute of Electrical and Electronics Engineers Inc., pp. 55-71, 40th IEEE Symposium on Security and Privacy, SP 2019, San Francisco, United States, 19/05/19 . https://doi.org/10.1109/SP.2019.00089
2019 IEEE Symposium on Security and Privacy (SP)
Proceedings-2019 IEEE Symposium on Security and Privacy (SP): 19-23 May 2019, 55-71
STARTPAGE=55;ENDPAGE=71;TITLE=Proceedings-2019 IEEE Symposium on Security and Privacy (SP)
Cojocar, L, Razavi, K, Giuffrida, C & Bos, H 2019, Exploiting correcting codes : On the effectiveness of ECC memory against rowhammer attacks . in Proceedings-2019 IEEE Symposium on Security and Privacy (SP) : 19-23 May 2019 ., 8835222, Proceedings-IEEE Symposium on Security and Privacy, vol. 2019-May, Institute of Electrical and Electronics Engineers Inc., pp. 55-71, 40th IEEE Symposium on Security and Privacy, SP 2019, San Francisco, United States, 19/05/19 . https://doi.org/10.1109/SP.2019.00089
2019 IEEE Symposium on Security and Privacy (SP)
Proceedings-2019 IEEE Symposium on Security and Privacy (SP): 19-23 May 2019, 55-71
STARTPAGE=55;ENDPAGE=71;TITLE=Proceedings-2019 IEEE Symposium on Security and Privacy (SP)
Given the increasing impact of Rowhammer, and the dearth of adequate other hardware defenses, many in the security community have pinned their hopes on error-correcting code (ECC) memory as one of the few practical defenses against Rowhammer attacks.
Publikováno v:
EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017, 1-6
STARTPAGE=1;ENDPAGE=6;TITLE=EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017
Cojocar, L, Razavi, K & Bos, H 2017, Off-the-shelf embedded devices as platforms for security research . in EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017 ., 1, ACM Press, New York, NY, pp. 1-6, 10th European Workshop on Systems Security, EuroSec 2017, co-located with European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, 23/04/17 . https://doi.org/10.1145/3065913.3065919
EUROSEC
STARTPAGE=1;ENDPAGE=6;TITLE=EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017
Cojocar, L, Razavi, K & Bos, H 2017, Off-the-shelf embedded devices as platforms for security research . in EuroSec 2017, Proceedings of the 10th European Workshop on Systems Security, co-located with European Conference on Computer Systems, EuroSys 2017 ., 1, ACM Press, New York, NY, pp. 1-6, 10th European Workshop on Systems Security, EuroSec 2017, co-located with European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, 23/04/17 . https://doi.org/10.1145/3065913.3065919
EUROSEC
With increasing concerns about the security and trustwor- thiness of embedded devices, the importance of research on their firmware is growing. Unfortunately, researchers with new ideas for improving the security of these devices (e.g., fuzzing) or s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aef26d032a16122bb90eca8898d8e0df
https://research.vu.nl/en/publications/80a4d2f9-2179-4afb-8684-21b96256dbcc
https://research.vu.nl/en/publications/80a4d2f9-2179-4afb-8684-21b96256dbcc
Publikováno v:
Cojocar, L, Kroes, T & Bos, H 2017, JTR : A binary solution for switch-case recovery . in Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings . vol. 10379 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10379 LNCS, Springer/Verlag, pp. 177-195, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, Bonn, Germany, 3/07/17 . https://doi.org/10.1007/978-3-319-62105-0_12
Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings, 10379 LNCS, 177-195
Lecture Notes in Computer Science ISBN: 9783319621043
ESSoS
Engineering Secure Software and Systems-9th International Symposium, ESSoS 2017, Proceedings, 10379 LNCS, 177-195
Lecture Notes in Computer Science ISBN: 9783319621043
ESSoS
Most security solutions that rely on binary rewriting assume a clean separation between code and data. Unfortunately, jump tables violate this assumption. In particular, switch statements in binary code often appear as indirect jumps with jump tables
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6570682fb18d6e097b0c91823fa5def6
https://research.vu.nl/en/publications/c722bf74-ba40-46b6-a8e7-5f16f49fd3ed
https://research.vu.nl/en/publications/c722bf74-ba40-46b6-a8e7-5f16f49fd3ed
Publikováno v:
NDSS'17
NDSS
Rawat, S, Jain, V, Kumar, A, Cojocar, L, Giuffrida, C & Bos, H 2017, VUzzer : Application-aware Evolutionary Fuzzing . in NDSS'17 . NDSS'17 . https://doi.org/10.14722/ndss.2017.23404
NDSS
Rawat, S, Jain, V, Kumar, A, Cojocar, L, Giuffrida, C & Bos, H 2017, VUzzer : Application-aware Evolutionary Fuzzing . in NDSS'17 . NDSS'17 . https://doi.org/10.14722/ndss.2017.23404
See, stats, and : https : / / www . researchgate . net / publication / 311886374 VUzzer : Application - aware Conference DOI : 10 . 14722 / ndss . 2017 . 23404 CITATIONS 0 READS 17 6 , including : Some : Systems Sanjay Vrije , Amsterdam , Netherlands
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c259062497502365e6a80bca4eb58f19
https://research.vu.nl/en/publications/dc1d1110-5c1a-4b05-9b54-5c859130c4bf
https://research.vu.nl/en/publications/dc1d1110-5c1a-4b05-9b54-5c859130c4bf