Pubblicazioni di D'Elia Daniele Cono
2022
D’Elia Daniele Cono, Invidia Lorenzo, Palmaro Federico, Querzoni Leonardo
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. DIGITAL THREATS 2022: 1-13
2021
Borrello P., D'Elia D. C., Querzoni L., Giuffrida C.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733
D'Elia Daniele Cono, Nicchi Simone, Mariani Matteo, Marini Matteo, Palmaro Federico
Designing Robust API Monitoring Solutions. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: 1-15
Borrello Pietro, Coppa Emilio, D'Elia Daniele Cono
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568
D'Elia Daniele Cono
D'Elia D. C., Invidia L., Querzoni L.
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming. Computer Security – ESORICS 2021 2021: 197-217
Fioraldi A., D'Elia D. C., Balzarotti D.
The use of likely invariants as feedback for fuzzers. Proceedings of the 30th USENIX Security Symposium 2021: 2829-2846
2020
Fioraldi A., Delia D. C., Querzoni L.
Fuzzing Binaries for Memory Safety Errors with QASan. 2020 IEEE Secure Development (SecDev) 2020: 23-30
D'Elia Daniele Cono
My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection. Black Hat Europe Briefings 2020: -
D'Elia D. C., Coppa E., Palmaro F., Cavallaro L.
On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765
Fioraldi A., D'Elia D. C., Coppa E.
WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13
2019
D'Elia Daniele Cono
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection. Black Hat Europe Briefings 2019: -
Borzacchiello Luca, Coppa Emilio, D'Elia DANIELE CONO, Demetrescu Camil
Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -
Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140
D'Elia DANIELE CONO, Coppa Emilio, Nicchi Simone, Palmaro Federico, Cavallaro Lorenzo
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27
D'Elia D. C., Coppa E., Salvati A., Demetrescu C.
Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -
Angelini Marco, Blasilli Graziano, Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Lenti Simone, Nicchi Simone, Santucci Giuseppe
SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -
Borrello P., Coppa E., D'Elia D. C., Demetrescu C.
The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970
2018
Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -
D'Elia Daniele Cono, Demetrescu Camil
On-stack replacement, distilled. ACM SIGPLAN NOTICES 2018: 166-180
Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia , Serena Ferracci, Simone Lenti, Giuseppe Santucci
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -
2017
Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188
Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618
2016-06-27
D'Elia DANIELE CONO
New techniques for adaptive program optimization. 2016-06-27: -
2016
D'Elia DANIELE CONO, Demetrescu Camil
Flexible On-Stack Replacement in LLVM. Proceedings of the 14th International Symposium on Code Generation and Optimization, CGO 2016 2016: 250-260
D'Elia DANIELE CONO, Demetrescu Camil
D'ELIA DANIELE CONO, DEMETRESCU Camil, FINOCCHI Irene
Mining Hot Calling Contexts in Small Space. SOFTWARE, PRACTICE AND EXPERIENCE 2016: 1131-1152
2014
D'Elia DANIELE CONO, Demetrescu Camil, Finocchi Irene
2013
D'Elia DANIELE CONO, Demetrescu Camil
Ball-larus path profiling across multiple loop iterations. ACM SIGPLAN NOTICESProceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications 2013: 373-390
2011
D'Elia DANIELE CONO, Demetrescu Camil, Finocchi Irene
Mining Hot Calling Contexts in Small Space. Proceedings of the 32nd ACM SIGPLAN conference on Programming Language Design and Implementation 2011: 516-527
Guidi A
Les conclusions ‘galliardes’ du Secrétaire florentin : esprit de finesse, initiative et efficacité politique dans l'activité pratique de Machiavel. Être homme de 'lettres': secrétaires et politique culturelle au Cinquecento : -
Giresini L, Andreini M, De Falco A, Puppio Ml, Sassu M
Structural protection after landslide phenomena: a case study in Northern Italy. Proceeding of the 4th CEUP2015 (Int. Conf. on Civil Engineering and Urban Planning) : -