Marco Guarnieri

Orcid: 0000-0001-5767-555X

According to our database1, Marco Guarnieri authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Testing side-channel security of cryptographic implementations against future microarchitectures.
CoRR, 2024

Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors.
CoRR, 2024

2023
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481).
Dagstuhl Reports, 2023

Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Turning Point for Verified Spectre Sandboxing.
CoRR, 2022

ANOSY: approximated knowledge synthesis with refinement types for declassification.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

Automatic Detection of Speculative Execution Combinations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Hardware-Software Contracts for Secure Speculation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Exorcising Spectres with Secure Compilers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Contract-Aware Secure Compilation.
CoRR, 2020

Flushgeist: Cache Leaks from Beyond the Flush.
CoRR, 2020

Spectector: Principled Detection of Speculative Information Flows.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

CacheQuery: learning replacement policies from hardware caches.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

2019
Information-Flow Control for Database-Backed Applications.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2017
Test execution checkpointing for web applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Securing Databases from Probabilistic Inference.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Synthesis of Probabilistic Privacy Enforcement.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Strong and Provably Secure Database Access Control.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2014
Optimal Security-Aware Query Processing.
Proc. VLDB Endow., 2014

2013
A Model-driven Approach for Securing Software Architectures.
Proceedings of the SECRYPT 2013, 2013

On the notion of redundancy in access control policies.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

AURORA: AUtomatic RObustness coveRage Analysis Tool.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
Evolutionary Testing of PHP Web Applications with WETT.
Proceedings of the Search Based Software Engineering - 4th International Symposium, 2012

Extending Coverage Criteria by Evaluating Their Robustness to Code Structure Changes.
Proceedings of the Testing Software and Systems, 2012

Model-Driven Testing for Web Applications Using Abstract State Machines.
Proceedings of the Current Trends in Web Engineering, 2012


  Loading...