A survey of symbolic execution techniques R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi ACM Computing Surveys 51 (3), 2018 | 933 | 2018 |
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 72 | 2019 |
Weizz: Automatic grey-box fuzzing for structured binary formats A Fioraldi, DC D'Elia, E Coppa Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020 | 70 | 2020 |
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization P Borrello, DC D'Elia, L Querzoni, C Giuffrida Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 66 | 2021 |
On the Dissection of Evasive Malware DC D’Elia, E Coppa, F Palmaro, L Cavallaro IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020 | 63 | 2020 |
The Use of Likely Invariants as Feedback for Fuzzers A Fioraldi, DC D’Elia, D Balzarotti 30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021 | 49 | 2021 |
Fuzzing Binaries for Memory Safety Errors with QASan A Fioraldi, DC D’Elia, L Querzoni IEEE Secure Development Conference (SecDev) 2020, 2020 | 43 | 2020 |
Assisting malware analysis with symbolic execution: A case study R Baldoni, E Coppa, DC D’Elia, C Demetrescu Cyber Security Cryptography and Machine Learning: First International …, 2017 | 41 | 2017 |
Mining hot calling contexts in small space DC D'Elia, C Demetrescu, I Finocchi ACM SIGPLAN Notices 46 (6), 516-527, 2011 | 38 | 2011 |
Rethinking pointer reasoning in symbolic execution E Coppa, DC D'Elia, C Demetrescu 2017 32nd IEEE/ACM International Conference on Automated Software …, 2017 | 32 | 2017 |
Memory models in symbolic execution: key ideas and new thoughts L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu Software Testing, Verification and Reliability 29 (8), 2019 | 29 | 2019 |
Flexible on-stack replacement in LLVM DC D'Elia, C Demetrescu Proceedings of the 2016 International Symposium on Code Generation and …, 2016 | 28 | 2016 |
On-stack replacement, distilled DC D'Elia, C Demetrescu Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018 | 27 | 2018 |
Ball-larus path profiling across multiple loop iterations DC D'Elia, C Demetrescu ACM SIGPLAN Notices 48 (10), 373-390, 2013 | 23 | 2013 |
ROPMate: Visually Assisting the Creation of ROP-based Exploits M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ... 2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018 | 22 | 2018 |
SymNav: Visually Assisting Symbolic Execution M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ... | 19 | 2019 |
Designing Robust API Monitoring Solutions DC D'Elia, S Nicchi, M Mariani, M Marini, F Palmaro Transactions on Dependable and Secure Computing, 2021 | 16* | 2021 |
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse P Borrello, E Coppa, DC D'Elia, C Demetrescu 34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019 | 16 | 2019 |
Reconstructing C2 servers for remote access trojans with symbolic execution L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu Cyber Security Cryptography and Machine Learning: Third International …, 2019 | 14 | 2019 |
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation P Borrello, E Coppa, DC D'Elia 51st Annual IEEE/IFIP International Conference on Dependable Systems and …, 2021 | 13 | 2021 |