
RESCALE papers and publications in journals, conferences, workshops, book chapters, white papers.
Journal Papers
- Game On: A Performance Comparison of Interpolation Techniques Applied to Shamir’s Secret Sharing. A. Voudouris, A. Tressos, A. Zarras, and C. Xenakis. The Computer Journal, bxae109, 2024. Oxford University Press.
Conference Papers
- Safeguarding Blockchain and DLTs From Arbitrary and Malicious Content. A. Barnett, M. Globin, T. Zaarour, S. Ahearne, and A. Khalid. In Proceedings of the IEEE 32nd International Conference on Network Protocols (ICNP 2024), pp. 1–6, 2024 (under embargo).
- iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys. G. Christou, G. Vasiliadis, A. Zarras, and S. Ioannidis. In Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, July 2024.
- Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB). T. Lahtinen, A. Costin, G. Suarez-Tangil, and H. Turtiainen. In Proceedings of the 3rd Workshop on Rethinking Malware Analysis (WoRMA), July 2024 (under embargo).
- VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP. H. Turtiainen and A. Costin. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 618–625, 2024 (under embargo).
- Reproducibility of Firmware Analysis: An Empirical Study. N. Yousefnezhad and A. Costin. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 207–225, 2024 (under embargo).
- A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems. T. Lahtinen, A. Costin, G. Suarez-Tangil, and N. Yousefnezhad. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 166–185, 2024 (under embargo).
- Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective. N. Yousefnezhad and A. Costin. In Proceedings of the International Symposium on Business Modeling and Software Design (BMSD), pp. 293–304, 2024 (under embargo).
- GhostRace: Exploiting and Mitigating Speculative Race Conditions. H. Ragab, A. Mambretti, A. Kurmus, and C. Giuffrida. In Proceedings of the USENIX Security Symposium, 2024.
- SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching. V. Duta, M. J. Aloserij, and C. Giuffrida. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), pp. 1207–1224, 2024.
- InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-Privilege Spectre v2. S. Wiebing, A. de Faveri Tron, H. Bos, and C. Giuffrida. In Proceedings of the USENIX Security Symposium, 2024.
- Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. F. Gorter, T. Kroes, H. Bos, and C. Giuffrida. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 217–217. IEEE Computer Society, 2024.
- Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. M. Hertogh, S. Wiebing, and C. Giuffrida. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), pp. 158–158. IEEE Computer Society, 2024.
- Predictive Context-Sensitive Fuzzing. P. Borrello, A. Fioraldi, D. Balzarotti, L. Querzoni, C. Giuffrida, and others.
Book Chapters
- Securing the Software Supply Chain: Innovations and Approaches. In Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, Now Publishers, 2025 (not yet published).