Follow
Daniele Cono D'Elia
Title
Cited by
Cited by
Year
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi
ACM Computing Surveys 51 (3), 2018
9332018
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
722019
Weizz: Automatic grey-box fuzzing for structured binary formats
A Fioraldi, DC D'Elia, E Coppa
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
702020
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
P Borrello, DC D'Elia, L Querzoni, C Giuffrida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
662021
On the Dissection of Evasive Malware
DC D’Elia, E Coppa, F Palmaro, L Cavallaro
IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020
632020
The Use of Likely Invariants as Feedback for Fuzzers
A Fioraldi, DC D’Elia, D Balzarotti
30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021
492021
Fuzzing Binaries for Memory Safety Errors with QASan
A Fioraldi, DC D’Elia, L Querzoni
IEEE Secure Development Conference (SecDev) 2020, 2020
432020
Assisting malware analysis with symbolic execution: A case study
R Baldoni, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: First International …, 2017
412017
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
ACM SIGPLAN Notices 46 (6), 516-527, 2011
382011
Rethinking pointer reasoning in symbolic execution
E Coppa, DC D'Elia, C Demetrescu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
322017
Memory models in symbolic execution: key ideas and new thoughts
L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu
Software Testing, Verification and Reliability 29 (8), 2019
292019
Flexible on-stack replacement in LLVM
DC D'Elia, C Demetrescu
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
282016
On-stack replacement, distilled
DC D'Elia, C Demetrescu
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
272018
Ball-larus path profiling across multiple loop iterations
DC D'Elia, C Demetrescu
ACM SIGPLAN Notices 48 (10), 373-390, 2013
232013
ROPMate: Visually Assisting the Creation of ROP-based Exploits
M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ...
2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018
222018
SymNav: Visually Assisting Symbolic Execution
M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ...
192019
Designing Robust API Monitoring Solutions
DC D'Elia, S Nicchi, M Mariani, M Marini, F Palmaro
Transactions on Dependable and Secure Computing, 2021
16*2021
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
P Borrello, E Coppa, DC D'Elia, C Demetrescu
34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019
162019
Reconstructing C2 servers for remote access trojans with symbolic execution
L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: Third International …, 2019
142019
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
P Borrello, E Coppa, DC D'Elia
51st Annual IEEE/IFIP International Conference on Dependable Systems and …, 2021
132021
The system can't perform the operation now. Try again later.
Articles 1–20