Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Daniele Cono D'Elia"'
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:392-406
Tracing the sequence of library and system calls that a program makes is very helpful in the characterization of its interactions with the surrounding environment and ultimately of its semantics. Due to entanglements of real-world software stacks, ac
Publikováno v:
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering.
Publikováno v:
Cono D'Elia, D, Coppa, E, Palmaro, F & Cavallaro, L 2020, ' On the Dissection of Evasive Malware ', IEEE Transactions on Information Forensics and Security, vol. 15, 9018111, pp. 2750-2765 . https://doi.org/10.1109/TIFS.2020.2976559
Complex malware samples feature measures to impede automatic and manual analyses, making their investigation cumbersome. While automatic characterization of malware benefits from recently proposed designs for passive monitoring, the subsequent dissec
The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1c137dc51cb42d6372e502545db35635
Publikováno v:
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 715-733
STARTPAGE=715;ENDPAGE=733;TITLE=CCS '21
CCS
Borrello, P, D'Elia, D C, Querzoni, L & Giuffrida, C 2021, Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization . in CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 715-733, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484583
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
STARTPAGE=715;ENDPAGE=733;TITLE=CCS '21
CCS
Borrello, P, D'Elia, D C, Querzoni, L & Giuffrida, C 2021, Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization . in CCS '21 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 715-733, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484583
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd5f40c21a663bf59d3546aa59683456
https://research.vu.nl/en/publications/8df1370a-5797-49f1-86c8-203a6e8a3d93
https://research.vu.nl/en/publications/8df1370a-5797-49f1-86c8-203a6e8a3d93
Publikováno v:
DSN
Largely known for attack scenarios, code reuse techniques at a closer look reveal properties that are appealing also for program obfuscation. We explore the popular return-oriented programming paradigm under this light, transforming program functions
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884178
ESORICS (1)
ESORICS (1)
Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks of a malicious payload to multiple processes. Researchers have explored methods to chop payloads, spread chunks to victim appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dbff3ed654dfe5b63ae7badd1ba1d705
http://hdl.handle.net/11573/1582497
http://hdl.handle.net/11573/1582497
Publikováno v:
SecDev
Fuzz testing techniques are becoming pervasive for their ever-improving ability to generate crashing trial cases for programs. Memory safety violations however can lead to silent corruptions and errors, and a fuzzer may recognize them only in the pre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a1cde81b9033365e3b52eda4d4207131
http://hdl.handle.net/11573/1470329
http://hdl.handle.net/11573/1470329
Publikováno v:
ISSTA
Fuzzing technologies have evolved at a fast pace in recent years, revealing bugs in programs with ever increasing depth and speed. Applications working with complex formats are however more difficult to take on, as inputs need to meet certain format-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ded9dcc7c4e5b4a1990b0f326a0aad34
http://hdl.handle.net/11573/1499674
http://hdl.handle.net/11573/1499674
Publikováno v:
AsiaCCS
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering the execution of a running program up to the instruction level granularity. The ease of use and flexibility of DBI primitives has made them popular in a large