Titolo | Pubblicato in | Anno |
---|---|---|
Predictive Context-sensitive Fuzzing | Proceedings of the Network and Distributed System Security (NDSS) Symposium 2024 | 2024 |
Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method | Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2024. Lecture Notes in Computer Science | 2024 |
Adversarial Attacks against Binary Similarity Systems | IEEE ACCESS | 2024 |
Where Did My Variable Go? Poking Holes in Incomplete Debug Information | International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS | 2023 |
Uncontained: Uncovering Container Confusion in the Linux Kernel | Proceedings of the 32nd USENIX Security Symposium | 2023 |
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts | DIGITAL THREATS | 2022 |
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection | Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering | 2022 |
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation | 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) | 2021 |
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming | Computer Security – ESORICS 2021 | 2021 |
The use of likely invariants as feedback for fuzzers | Proceedings of the 30th USENIX Security Symposium | 2021 |
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization | Proceedings of the ACM Conference on Computer and Communications Security | 2021 |
Designing Robust API Monitoring Solutions | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 2021 |
On the Dissection of Evasive Malware | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 2020 |
Fuzzing Binaries for Memory Safety Errors with QASan | Proceedings - 2020 IEEE Secure Development, SecDev 2020 | 2020 |
WEIZZ: Automatic grey-box fuzzing for structured binary formats | ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis | 2020 |
Static analysis of ROP code | EuroSec '19 Proceedings of the 12th European Workshop on Systems Security | 2019 |
The ROP needle: Hiding trigger-based injection vectors via code reuse | SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing | 2019 |
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) | AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security | 2019 |
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution | Cyber Security Cryptography and Machine Learning | 2019 |
Memory Models in Symbolic Execution: Key Ideas and New Thoughts | SOFTWARE TESTING, VERIFICATION & RELIABILITY | 2019 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma