Volgen
Daniele Cono D'Elia
Daniele Cono D'Elia
Geverifieerd e-mailadres voor diag.uniroma1.it - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi
ACM Computing Surveys 51 (3), 2018
4852018
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
452019
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
ACM SIGPLAN Notices 46 (6), 516-527, 2011
372011
Assisting malware analysis with symbolic execution: A case study
R Baldoni, E Coppa, DC D’Elia, C Demetrescu
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
332017
Weizz: Automatic grey-box fuzzing for structured binary formats
A Fioraldi, DC D'Elia, E Coppa
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
292020
On the Dissection of Evasive Malware
DC D’Elia, E Coppa, F Palmaro, L Cavallaro
IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020
292020
Fuzzing Binaries for Memory Safety Errors with QASan
A Fioraldi, DC D’Elia, L Querzoni
IEEE Secure Development Conference (SecDev) 2020, 2020
252020
Flexible on-stack replacement in LLVM
DC D'Elia, C Demetrescu
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
222016
Ball-larus path profiling across multiple loop iterations
DC D'Elia, C Demetrescu
ACM SIGPLAN Notices 48 (10), 373-390, 2013
212013
Rethinking pointer reasoning in symbolic execution
E Coppa, DC D'Elia, C Demetrescu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
192017
On-stack replacement, distilled
DC D'Elia, C Demetrescu
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
182018
ROPMate: Visually Assisting the Creation of ROP-based Exploits
M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ...
2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018
152018
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
P Borrello, E Coppa, DC D'Elia, C Demetrescu
34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019
132019
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
P Borrello, DC D'Elia, L Querzoni, C Giuffrida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
122021
Memory models in symbolic execution: key ideas and new thoughts
L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu
Software Testing, Verification and Reliability 29 (8), 2019
112019
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
Software: Practice and Experience 46 (8), 1131-1152, 2016
102016
The Use of Likely Invariants as Feedback for Fuzzers
A Fioraldi, DC D’Elia, D Balzarotti
30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021
92021
SymNav: Visually Assisting Symbolic Execution
M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ...
82019
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
P Borrello, E Coppa, DC D'Elia
51st Annual IEEE/IFIP International Conference on Dependable Systems and …, 2021
72021
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution
L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
62019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20