default search action
Marco Guarnieri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Gideon Mohr, Marco Guarnieri, Jan Reineke:
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors. DATE 2024: 1-6 - [i17]Gideon Mohr, Marco Guarnieri, Jan Reineke:
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors. CoRR abs/2401.09383 (2024) - [i16]Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom:
Testing side-channel security of cryptographic implementations against future microarchitectures. CoRR abs/2402.00641 (2024) - [i15]Xaver Fabian, Marco Patrignani, Marco Guarnieri, Michael Backes:
Do You Even Lift? Strengthening Compiler Security Guarantees Against Spectre Attacks. CoRR abs/2405.10089 (2024) - 2023
- [c20]Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. CCS 2023: 2128-2142 - [c19]Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein:
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. SP 2023: 1737-1752 - [i14]Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein:
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. CoRR abs/2301.07642 (2023) - [i13]Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. CoRR abs/2305.06979 (2023) - [i12]Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice:
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). Dagstuhl Reports 13(11): 151-166 (2023) - 2022
- [c18]Xaver Fabian, Marco Guarnieri, Marco Patrignani:
Automatic Detection of Speculative Execution Combinations. CCS 2022: 965-978 - [c17]Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker:
ANOSY: approximated knowledge synthesis with refinement types for declassification. PLDI 2022: 15-30 - [i11]Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker:
ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification. CoRR abs/2203.12069 (2022) - [i10]Sunjay Cauligi, Marco Guarnieri, Daniel Moghimi, Deian Stefan, Marco Vassena:
A Turning Point for Verified Spectre Sandboxing. CoRR abs/2208.01548 (2022) - [i9]Xaver Fabian, Marco Guarnieri, Marco Patrignani:
Automatic Detection of Speculative Execution Combinations. CoRR abs/2209.01179 (2022) - 2021
- [c16]Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi:
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts. ARES 2021: 17:1-17:10 - [c15]Marco Patrignani, Marco Guarnieri:
Exorcising Spectres with Secure Compilers. CCS 2021: 445-461 - [c14]Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila:
Hardware-Software Contracts for Secure Speculation. SP 2021: 1868-1883 - 2020
- [c13]Pepe Vila, Pierre Ganty, Marco Guarnieri, Boris Köpf:
CacheQuery: learning replacement policies from hardware caches. PLDI 2020: 519-532 - [c12]Marco Guarnieri, Boris Köpf, José F. Morales, Jan Reineke, Andrés Sánchez:
Spectector: Principled Detection of Speculative Information Flows. SP 2020: 1-19 - [i8]Pepe Vila, Andreas Abel, Marco Guarnieri, Boris Köpf, Jan Reineke:
Flushgeist: Cache Leaks from Beyond the Flush. CoRR abs/2005.13853 (2020) - [i7]Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila:
Hardware-Software Contracts for Secure Speculation. CoRR abs/2006.03841 (2020) - [i6]Marco Guarnieri, Marco Patrignani:
Contract-Aware Secure Compilation. CoRR abs/2012.14205 (2020)
2010 – 2019
- 2019
- [c11]Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld:
Information-Flow Control for Database-Backed Applications. EuroS&P 2019: 79-94 - [i5]Marco Guarnieri, Marco Patrignani:
Exorcising Spectres with Secure Compilers. CoRR abs/1910.08607 (2019) - [i4]Pepe Vila, Pierre Ganty, Marco Guarnieri, Boris Köpf:
CacheQuery: Learning Replacement Policies from Hardware Caches. CoRR abs/1912.09770 (2019) - 2018
- [i3]Marco Guarnieri, Boris Köpf, José F. Morales, Jan Reineke, Andrés Sánchez:
SPECTECTOR: Principled Detection of Speculative Information Flows. CoRR abs/1812.08639 (2018) - 2017
- [c10]Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin T. Vechev:
Synthesis of Probabilistic Privacy Enforcement. CCS 2017: 391-408 - [c9]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. CSF 2017: 343-359 - [c8]Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin:
Test execution checkpointing for web applications. ISSTA 2017: 203-214 - [i2]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. CoRR abs/1706.02473 (2017) - 2016
- [c7]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. EuroS&P 2016: 163-178 - 2015
- [i1]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. CoRR abs/1512.01479 (2015) - 2014
- [j1]Marco Guarnieri, David A. Basin:
Optimal Security-Aware Query Processing. Proc. VLDB Endow. 7(12): 1307-1318 (2014) - 2013
- [c6]Angelo Gargantini, Marco Guarnieri, Eros Magri:
AURORA: AUtomatic RObustness coveRage Analysis Tool. ICST 2013: 463-470 - [c5]Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, Simone Mutti:
On the notion of redundancy in access control policies. SACMAT 2013: 161-172 - [c4]Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi:
A Model-driven Approach for Securing Software Architectures. SECRYPT 2013: 595-602 - 2012
- [c3]Francesco Bolis, Angelo Gargantini, Marco Guarnieri, Eros Magri, Lorenzo Musto:
Model-Driven Testing for Web Applications Using Abstract State Machines. ICWE Workshops 2012: 71-78 - [c2]Angelo Gargantini, Marco Guarnieri, Eros Magri:
Extending Coverage Criteria by Evaluating Their Robustness to Code Structure Changes. ICTSS 2012: 168-183 - [c1]Francesco Bolis, Angelo Gargantini, Marco Guarnieri, Eros Magri:
Evolutionary Testing of PHP Web Applications with WETT. SSBSE 2012: 285-291
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint