Michele Marazzi

I am currently a PhD student at the COMSEC group at ETH Zurich, to research on DRAM security, microarchitectural attacks and side channels.

Recently, I showed how to obtain Rowhammer bit flips on RISC-V for the first time. Before, we reverse engineered commodity DRAM devices, demonstrated attacks on public transport applications, and designed secure in-DRAM Rowhammer mitigations. My PhD defense is scheduled to happen in mid 2024.

For my Master, I studied Biomedical Engineering at POLIMI, with a focus over electronics technologies (BTE). I graduated with 110/110 cum Laude and a course average grade of 29.8/30 (GPA 3.97/4, top 1%).

Email  /  Linkedin  /  Publications List

profile photo
Short write-ups:

Injecting code into 32bit binary with ASLR (Reversing / Security) August-2020.
CTF: Level 2 of Practical Binary Analysis challenges (Reversing / CTF) August-2020.
CTF: Challenge 45 from Dennis Yurichev - Bruteforcing copyprotection with Python (Reversing / CTF) August-2020.

Recorded presentations:

REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations May 2023, San Francisco, IEEE S&P.
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh May 2022, San Francisco, IEEE S&P.

Scholarships, Awards and Competitions :

(2024) HiFi-DRAM nominated for best paper at ISCA .
(2022) CSAW Applied Research Competition (ARC) finalist with ProTRR.
(2017/2018) Scholarship for "Master Thesis abroad". - Polytechnic University of Milan.
(2017/2018) Student with high merits. - Polytechnic University of Milan.

Further/older projects