
RESCALE papers and publications in journals, conferences, workshops, book chapters, white papers.
Journal Papers
- Game On: A Performance Comparison of Interpolation Techniques Applied to Shamir’s Secret Sharing. A. Voudouris, A. Tressos, A. Zarras, and C. Xenakis. The Computer Journal, bxae109, 2024. Oxford University Press.
- Suspicious Minds: Psychological Techniques Correlated with Online Phishing Attacks. I. Stylianou, P. Bountakas, A. Zarras, and C. Xenakis. Computers in Human Behavior Reports, 100694, 2025. Elsevier.
- CRASHED: Cyber Risk Assessment for Smart Home Electronic Devices. G. Paparis, A. Zarras, A. Farao, and C. Xenakis. Journal of Information Security and Applications, 104054, 2025. Elsevier.
- EU Regulatory Ecosystem for Ethical AI. V. Bolgouras, A. Zarras, C. Leka, I. Stylianou, A. Farao, and C. Xenakis. AI and Ethics, 1–18, 2025. Springer.
- B2SAPP: Blockchain Based Solution for Maritime Security Applications. A. Farao, A. Zarras, A. Voudouris, G. Paparis, and C. Xenakis. Frontiers in Computer Science, 1572009, 2025. Frontiers Media.
Conference Papers
- RangeSanitizer: Detecting Memory Errors with Efficient Range Checks. F. Gorter and C. Giuffrida. In Proceedings of the USENIX Security Symposium, 2025.
- Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks. A. de Faveri Tron, R. Isemann, H. Ragab, C. Giuffrida, K. von Gleissenthall, and H. Bos. In Proceedings of the USENIX Security Symposium, 2025.
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing. E. Geretto, A. Jemmett, C. Giuffrida, and H. Bos. In Proceedings of the 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P), pp. 355–373, 2025.
- Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks. S. Wiebing and C. Giuffrida. In Proceedings of the 2025 IEEE Symposium on Security and Privacy (SP), pp. 3599–3616, 2025.
- Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets. A. Di Dio, M. Hertogh, and C. Giuffrida. In Proceedings of the 2025 IEEE Symposium on Security and Privacy (SP), pp. 3583–3598, 2025.
- hwdbg: Debugging Hardware Like Software. M. S. Karvandi, S. Meghdadizanjani, S. K. Monfared, E. van der Kouwe, and A. Slowinska. In Proceedings of the 18th European Workshop on Systems Security, pp. 56–62, 2025.
- Safeguarding Blockchain and DLTs From Arbitrary and Malicious Content. A. Barnett, M. Globin, T. Zaarour, S. Ahearne, and A. Khalid. In Proceedings of the IEEE 32nd International Conference on Network Protocols (ICNP 2024), pp. 1–6, 2024 (under embargo).
- iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys. G. Christou, G. Vasiliadis, A. Zarras, and S. Ioannidis. In Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, July 2024.
- Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB). T. Lahtinen, A. Costin, G. Suarez-Tangil, and H. Turtiainen. In Proceedings of the 3rd Workshop on Rethinking Malware Analysis (WoRMA), July 2024 (under embargo).
- VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP. H. Turtiainen and A. Costin. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 618–625, 2024 (under embargo).
- Reproducibility of Firmware Analysis: An Empirical Study. N. Yousefnezhad and A. Costin. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 207–225, 2024 (under embargo).
- A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems. T. Lahtinen, A. Costin, G. Suarez-Tangil, and N. Yousefnezhad. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 166–185, 2024 (under embargo).
- Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective. N. Yousefnezhad and A. Costin. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 293–304, 2024 (under embargo).
- GhostRace: Exploiting and Mitigating Speculative Race Conditions. H. Ragab, A. Mambretti, A. Kurmus, and C. Giuffrida. In Proceedings of the USENIX Security Symposium, 2024.
- SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching. V. Duta, M. J. Aloserij, and C. Giuffrida. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), pp. 1207–1224, 2024.
- InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-Privilege Spectre v2. S. Wiebing, A. de Faveri Tron, H. Bos, and C. Giuffrida. In Proceedings of the USENIX Security Symposium, 2024.
- Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. F. Gorter, T. Kroes, H. Bos, and C. Giuffrida. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 217–217. IEEE Computer Society, 2024.
- Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. M. Hertogh, S. Wiebing, and C. Giuffrida. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 158–158. IEEE Computer Society, 2024.
- Predictive Context-Sensitive Fuzzing. P. Borrello, A. Fioraldi, D. Balzarotti, L. Querzoni, C. Giuffrida, and others.
Book Chapters
- Securing the Software Supply Chain: Innovations and Approaches. In Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, Now Publishers, 2025.