Volgen
Claudio Canella
Claudio Canella
Amazon Web Services
Geverifieerd e-mailadres voor amazon.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A systematic evaluation of transient execution attacks and defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ...
28th USENIX Security Symposium (USENIX Security 19), 249-266, 2019
5222019
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
406*2019
PLATYPUS: Software-based power side-channel attacks on x86
M Lipp, A Kogler, D Oswald, M Schwarz, C Easdon, C Canella, D Gruss
2021 IEEE Symposium on Security and Privacy (SP), 355-371, 2021
2102021
Context: A generic approach for mitigating spectre
M Schwarz, M Lipp, CA Canella, R Schilling, F Kargl, D Gruss
Network and Distributed System Security Symposium 2020, 2020
128*2020
KASLR: Break it, fix it, repeat
C Canella, M Schwarz, M Haubenwallner, M Schwarzl, D Gruss
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
752020
Store-to-leak forwarding: Leaking data on meltdown-resistant CPUs (updated and extended version)
M Schwarz, C Canella, L Giner, D Gruss
arXiv preprint arXiv:1905.05725, 2019
742019
Automating seccomp filter generation for linux applications
C Canella, M Werner, D Gruss, M Schwarz
Proceedings of the 2021 on Cloud Computing Security Workshop, 139-151, 2021
502021
Evolution of defenses against transient-execution attacks
C Canella, SM Pudukotai Dinakarrao, D Gruss, KN Khasawneh
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 169-174, 2020
342020
The evolution of transient-execution attacks
C Canella, KN Khasawneh, D Gruss
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 163-168, 2020
262020
Specfuscator: Evaluating branch removal as a Spectre mitigation
M Schwarzl, C Canella, D Gruss, M Schwarz
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
182021
Programmable system call security with ebpf
J Jia, YF Zhu, D Williams, A Arcangeli, C Canella, H Franke, ...
arXiv preprint arXiv:2302.10366, 2023
162023
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
C Canella, S Dorn, D Gruss, M Schwarz
arXiv preprint arXiv:2202.13716, 2022
82022
Repurposing Segmentation as a Practical {LVI-NULL} Mitigation in {SGX}
L Giner, A Kogler, C Canella, M Schwarz, D Gruss
31st USENIX Security Symposium (USENIX Security 22), 3111-3127, 2022
62022
misc0110/PTEditor: a small library to modify all page-table levels of all processes from user space for x86_64 and ARMv8 (2018)
M Schwarz, M Lipp, C Canella
URL: https://github. com/misc0110/PTEditor, 0
5
Domain Page-Table Isolation
C Canella, A Kogler, L Giner, D Gruss, M Schwarz
arXiv preprint arXiv:2111.10876, 2021
42021
Systematic analysis of programming languages and their execution environments for spectre attacks
A Naseredini, S Gast, M Schwarzl, PMS Bernardo, A Smajic, C Canella, ...
arXiv preprint arXiv:2111.12528, 2021
22021
Hardening the Kernel Against Unprivileged Attacks
C Canella
Graz University of Technology, 2022
2022
Know Where You Come From
C Canella
2022
Store-to-Leak Forwarding
C Canella, L Giner
2020
Enter Sandbox
C Canella, M Werner, M Schwarz
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20