Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Mila Dalla Preda"'
Publikováno v:
Logical Methods in Computer Science, Vol Volume 13, Issue 2 (2017)
Programming distributed applications free from communication deadlocks and race conditions is complex. Preserving these properties when applications are updated at runtime is even harder. We present a choreographic approach for programming updatable,
Externí odkaz:
https://doaj.org/article/1048dab97e3b4aeca9e102c38815a52c
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:506-521
Publikováno v:
Proceedings of the ACM on Programming Languages. 6:1-31
Imprecision is inherent in any decidable (sound) approximation of undecidable program properties. In abstract interpretation this corresponds to the release of false alarms, e.g., when it is used for program analysis and program verification. As all
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 17:279-297
In the past few years, malware classification techniques have shifted from shallow traditional machine learning models to deeper neural network architectures. The main benefit of some of these is the ability to work with raw data, guaranteed by their
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 17:167-183
Metamorphic malware are self-modifying programs which apply semantic preserving transformations to their own code in order to foil detection systems based on signature matching. Metamorphism impacts both software security and code protection technolo
Autor:
Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Net
Publikováno v:
ICPC
Motivated by the immutable nature of Ethereum smart contracts and of their transactions, quite many approaches have been proposed to detect defects and security problems before smart contracts become persistent in the blockchain and they are granted
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::005b6b48ca3012a3204169abef602533
http://hdl.handle.net/11562/1048970
http://hdl.handle.net/11562/1048970
Publikováno v:
EuroS&P Workshops
One of the most challenging problems in the fight against Android malware is finding a way to classify them according to their behavior, in order to be able to utilize previously gathered knowledge in analysis and prevention.In this paper we introduc
Publikováno v:
Static Analysis ISBN: 9783030654733
SAS
SAS
Dynamic program analysis is extremely successful both in code debugging and in malicious code attacks. Fuzzing, concolic, and monkey testing are instances of the more general problem of analysing programs by dynamically executing their code with sele
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ee2db6ef631e7200d9eb49e1c6a01eb
http://hdl.handle.net/11562/1033492
http://hdl.handle.net/11562/1033492
Autor:
Mila Dalla Preda, Michele Pasqua
Publikováno v:
Mathematical Structures in Computer Science. 29:339-388
Software watermarking is a software protection technique used to defend the intellectual property of proprietary code. In particular, software watermarking aims at preventing software piracy by embedding a signature, i.e. an identifier reliably repre