Titolo | Pubblicato in | Anno |
---|---|---|
Do you Trust your Device? Open Challenges in IoT Security Analysis | Proceedings of the International Conference on Security and Cryptography | 2024 |
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies | 19th International Conference on Availability, Reliability and Security (ARES 2024) | 2024 |
Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools | 43rd International Conference on Safety, Reliability and Security of Computer-based Systems, SAFECOMP 2024 | 2024 |
FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns | International Workshop on Visualization for Cyber Security | 2023 |
Handling Memory-Intensive Operations in Symbolic Execution | ISEC 2022: 15th Innovations in Software Engineering Conference | 2022 |
ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others | ACM TRANSACTIONS ON COMPUTER SYSTEMS | 2022 |
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2022 |
SymFusion: Hybrid Instrumentation for Concolic Execution | Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) | 2022 |
SENinja: A symbolic execution plugin for Binary Ninja | SOFTWAREX | 2022 |
Fuzzing Symbolic Expressions | 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) | 2021 |
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation | 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | 2021 |
FUZZOLIC: Mixing fuzzing and concolic execution | COMPUTERS & SECURITY | 2021 |
On the Dissection of Evasive Malware | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 2020 |
WEIZZ: Automatic grey-box fuzzing for structured binary formats | ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis | 2020 |
Counting cliques in parallel without a cluster: engineering a fork/join algorithm for shared-memory platforms | INFORMATION SCIENCES | 2019 |
Static analysis of ROP code | EuroSec '19 Proceedings of the 12th European Workshop on Systems Security | 2019 |
The ROP needle: Hiding trigger-based injection vectors via code reuse | SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing | 2019 |
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) | AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security | 2019 |
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution | Cyber Security Cryptography and Machine Learning | 2019 |
Memory Models in Symbolic Execution: Key Ideas and New Thoughts | SOFTWARE TESTING, VERIFICATION & RELIABILITY | 2019 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma