Pietro Borrello
Pietro Borrello
Home
Projects
Talks
Publications
CVEs
Publications
Type
Conference paper
Date
2024
2023
2022
2021
2019
2018
Pietro Borrello
,
A. Fioraldi
,
D.C. D'Elia
,
D. Balzarotti
,
L. Querzoni
,
C. Giuffrida
(2024).
Predictive Context-sensitive Fuzzing
. NDSS.
PDF
Cite
Code
J. Koschel
,
Pietro Borrello
,
D.C. D'Elia
,
H. Bos
,
C. Giuffrida
(2023).
Uncontained: Uncovering Container Confusion in the Linux Kernel
. USENIX Security.
PDF
Cite
Code
Pietro Borrello
,
Catherine Easdon
,
Martin Schwarzl
,
Roland Czerny
,
Michael Schwarz
(2023).
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
. WOOT.
PDF
Cite
Code
M. Schwarzl
,
Pietro Borrello
,
G. Saileshwar
,
H. Mueller
,
D. Gruss
,
M. Schwarz
(2023).
Practical Timing Side-Channel Attacks on Memory Compression
. Security & Privacy.
Cite
M. Schwarzl
,
Pietro Borrello
,
A. Kogler
,
T. Schuster
,
K. Varda
,
D. Gruss
,
M. Schwarz
(2022).
Robust and Scalable Process Isolation against Spectre in the Cloud
. ESORICS.
PDF
Cite
Project
DOI
Pietro Borrello
,
Andreas Kogler
,
Martin Schwarzl
,
Moritz Lipp
,
Daniel Gruss
,
Michael Schwarz
(2022).
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
. USENIX Security.
PDF
Cite
Code
Pietro Borrello
,
D.C. D'Elia
,
L. Querzoni
,
C. Giuffrida
(2021).
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
. ACM CCS.
PDF
Cite
Code
Slides
DOI
Pietro Borrello
,
E. Coppa
,
D.C. D'Elia
(2021).
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
. ACM DSN.
PDF
Cite
Code
DOI
Pietro Borrello
,
E. Coppa
,
D.C. D'Elia
,
C. Demetrescu
(2019).
The ROP needle: hiding trigger-based injection vectors via code reuse
. ACM SAC.
PDF
Cite
DOI
Pietro Borrello
,
E. Coppa
,
D.C. D'Elia
,
C. Demetrescu
(2018).
Boosting Virtualization Obfuscation with Return Oriented Programming
. Poster at ACM ACSAC.
M. Angelini
,
G. Blasilli
,
Pietro Borrello
,
E. Coppa
,
D.C. D'Elia
,
S. Ferracci
,
S. Lenti
,
G. Santucci
(2018).
Ropmate: Visually Assisting the Creation of ROP-Based Exploits
. IEEE VizSec.
PDF
Cite
Code
DOI
Cite
×