Titolo | Pubblicato in | Anno |
---|---|---|
The ROP needle: Hiding trigger-based injection vectors via code reuse | SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing | 2019 |
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) | AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security | 2019 |
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution | Cyber Security Cryptography and Machine Learning | 2019 |
Memory Models in Symbolic Execution: Key Ideas and New Thoughts | SOFTWARE TESTING, VERIFICATION & RELIABILITY | 2019 |
SymNav: Visually Assisting Symbolic Execution | Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) | 2019 |
A Survey of Symbolic Execution Techniques | ACM COMPUTING SURVEYS | 2018 |
On-stack replacement, distilled | ACM SIGPLAN NOTICES | 2018 |
ROPMate: Visually Assisting the Creation of ROP-based Exploits | 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) | 2018 |
Rethinking Pointer Reasoning in Symbolic Execution | ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering | 2017 |
Assisting malware analysis with symbolic execution: A case study | Cyber Security Cryptographyand Machine Learning | 2017 |
Mining Hot Calling Contexts in Small Space | SOFTWARE, PRACTICE AND EXPERIENCE | 2016 |
Flexible On-Stack Replacement in LLVM | Proceedings of the 14th International Symposium on Code Generation and Optimization, CGO 2016 | 2016 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma