Follow
Daniele Cono D'Elia
Title
Cited by
Cited by
Year
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi
ACM Computing Surveys 51 (3), 2018
8542018
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
702019
Weizz: Automatic grey-box fuzzing for structured binary formats
A Fioraldi, DC D'Elia, E Coppa
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
662020
On the Dissection of Evasive Malware
DC D’Elia, E Coppa, F Palmaro, L Cavallaro
IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020
562020
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
P Borrello, DC D'Elia, L Querzoni, C Giuffrida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
542021
The Use of Likely Invariants as Feedback for Fuzzers
A Fioraldi, DC D’Elia, D Balzarotti
30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021
442021
Fuzzing Binaries for Memory Safety Errors with QASan
A Fioraldi, DC D’Elia, L Querzoni
IEEE Secure Development Conference (SecDev) 2020, 2020
402020
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
ACM SIGPLAN Notices 46 (6), 516-527, 2011
382011
Assisting malware analysis with symbolic execution: A case study
R Baldoni, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: First International …, 2017
372017
On-stack replacement, distilled
DC D'Elia, C Demetrescu
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
272018
Flexible on-stack replacement in LLVM
DC D'Elia, C Demetrescu
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
272016
Rethinking pointer reasoning in symbolic execution
E Coppa, DC D'Elia, C Demetrescu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
262017
Memory models in symbolic execution: key ideas and new thoughts
L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu
Software Testing, Verification and Reliability 29 (8), 2019
242019
Ball-larus path profiling across multiple loop iterations
DC D'Elia, C Demetrescu
ACM SIGPLAN Notices 48 (10), 373-390, 2013
222013
ROPMate: Visually Assisting the Creation of ROP-based Exploits
M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ...
2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018
202018
SymNav: Visually Assisting Symbolic Execution
M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ...
182019
Designing Robust API Monitoring Solutions
DC D'Elia, S Nicchi, M Mariani, M Marini, F Palmaro
Transactions on Dependable and Secure Computing, 2021
162021
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
P Borrello, E Coppa, DC D'Elia, C Demetrescu
34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019
152019
Reconstructing C2 servers for remote access trojans with symbolic execution
L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: Third International …, 2019
132019
Rope: Covert Multi-Process Malware Execution with Return-Oriented Programming
DC D’Elia, L Invidia, L Querzoni
European Symposium on Research in Computer Security, 2021
122021
The system can't perform the operation now. Try again later.
Articles 1–20