Michele Marazzi, PhD

I have successfully defended my PhD in hardware security at ETH Zurich. My main research field has been DRAM security, and included security analysis of protocols, design of mitigations, proofs-of-security, timing side channels, fuzzer implementation, benchmarking, cycle-accurate full-system simulation, IC imaging via SEM and FIB, circuit reverse engineering, and analog simulations.

Recently, I showed how to obtain Rowhammer bit flips on RISC-V for the first time. Before, we reverse engineered commodity DRAM devices, demonstrated attacks on public transport applications, and designed secure in-DRAM Rowhammer mitigations.

For my Master, I studied Biomedical Engineering at POLIMI, with a focus over electronics technologies (BTE). I graduated with 110/110 cum Laude and a course average grade of 29.8/30 (GPA 3.97/4, top 1%).

Email  /  Linkedin  /  Publications List

profile photo
Short write-ups:

Injecting code into 32bit binary with ASLR (Reversing / Security) August-2020.
CTF: Level 2 of Practical Binary Analysis challenges (Reversing / CTF) August-2020.
CTF: Challenge 45 from Dennis Yurichev - Bruteforcing copyprotection with Python (Reversing / CTF) August-2020.

Recorded presentations:

REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations May 2023, San Francisco, IEEE S&P.
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh May 2022, San Francisco, IEEE S&P.

Scholarships, Awards and Competitions :

(2024) ProTRR nominated for Top Picks in Hardware and Embedded Security 2024.
(2024) HiFi-DRAM nominated for best paper at ISCA.
(2022) CSAW Applied Research Competition (ARC) finalist with ProTRR.
(2017/2018) Scholarship for "Master Thesis abroad". - Polytechnic University of Milan.
(2017/2018) Student with high merits. - Polytechnic University of Milan.

Further/older projects