Lorenzo De Carli
Lorenzo De Carli
Assistant Professor, Electrical and Software Engineering, University of Calgary
Geverifieerd e-mailadres voor ucalgary.ca - Homepage
Geciteerd door
Geciteerd door
A general constraint-centric scheduling framework for spatial architectures
T Nowatzki, M Sartin-Tarm, L De Carli, K Sankaralingam, C Estan, ...
ACM SIGPLAN Notices 48 (6), 495-506, 2013
Plug: Flexible lookup modules for rapid deployment of new protocols in high-speed routers
L De Carli, Y Pan, A Kumar, C Estan, K Sankaralingam
Proceedings of the ACM SIGCOMM 2009 conference on Data communication, 207-218, 2009
Cimplifier: automatically debloating containers
V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Beyond pattern matching: A concurrency model for stateful deep packet inspection
L De Carli, R Sommer, S Jha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Hilti: An abstract execution environment for deep, stateful network traffic analysis
R Sommer, M Vallentin, L De Carli, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014
Security issues in language-based sofware ecosystems
RK Vaidya, L De Carli, D Davidson, V Rastogi
arXiv preprint arXiv:1903.02613, 2019
Defending against package typosquatting
M Taylor, R Vaidya, D Davidson, LD Carli, V Rastogi
International Conference on Network and System Security, 112-131, 2020
Botnet protocol inference in the presence of encrypted traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Increasing performances of TCP data transfers through multiple parallel connections
A Baldini, L De Carli, F Risso
2009 IEEE Symposium on Computers and Communications, 630-636, 2009
EnCoD: Distinguishing Compressed and Encrypted File Fragments
FD Gaspari, D Hitaj, G Pagnotta, LD Carli, LV Mancini
International Conference on Network and System Security, 42-62, 2020
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
FD Gaspari, D Hitaj, G Pagnotta, LD Carli, LV Mancini
International Conference on Applied Cryptography and Network Security, 254-274, 2020
Deep packet inspection with DFA-trees and parametrized language overapproximation
D Luchaup, L De Carli, S Jha, E Bach
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 531-539, 2014
Experiences in co-designing a packet classification algorithm and a flexible hardware platform
N Vaish, T Kooburat, L De Carli, K Sankaralingam, C Estan
2011 ACM/IEEE Seventh Symposium on Architectures for Networking and …, 2011
Design and implementation of the plug architecture for programmable and efficient network lookups
A Kumar, L De Carli, SJ Kim, M de Kruijf, K Sankaralingam, C Estan, ...
Proceedings of the 19th international conference on Parallel architectures …, 2010
Leap: Latency-energy-and area-optimized lookup pipeline
EN Harris, SL Wasmundt, L De Carli, K Sankaralingam, C Estan
2012 ACM/IEEE Symposium on Architectures for Networking and Communications …, 2012
An analysis of first-party cookie exfiltration due to cname redirections
T Ren, A Wittman, L De Carli, D Davidson
Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
Deja vu: fingerprinting network problems
B Aggarwal, R Bhagwan, L De Carli, V Padmanabhan, K Puttaswamy
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
Reliable detection of compressed and encrypted data
F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini
Neural Computing and Applications, 1-15, 2022
Detection of Anomalous User Activity for Home IoT Devices.
V Bhosale, L De Carli, I Ray
IoTBDS, 309-314, 2021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20