Follow
Daniele Cono D'Elia
Title
Cited by
Cited by
Year
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi
ACM Computing Surveys 51 (3), 2018
4252018
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
392019
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
ACM SIGPLAN Notices 46 (6), 516-527, 2011
382011
Assisting malware analysis with symbolic execution: A case study
R Baldoni, E Coppa, DC D’Elia, C Demetrescu
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
332017
Weizz: Automatic grey-box fuzzing for structured binary formats
A Fioraldi, DC D'Elia, E Coppa
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
232020
On the Dissection of Evasive Malware
DC D’Elia, E Coppa, F Palmaro, L Cavallaro
IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020
222020
Flexible on-stack replacement in LLVM
DC D'Elia, C Demetrescu
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
202016
Ball-larus path profiling across multiple loop iterations
DC D'Elia, C Demetrescu
ACM SIGPLAN Notices 48 (10), 373-390, 2013
202013
Fuzzing Binaries for Memory Safety Errors with QASan
A Fioraldi, DC D’Elia, L Querzoni
IEEE Secure Development Conference (SecDev) 2020, 2020
182020
Rethinking pointer reasoning in symbolic execution
E Coppa, DC D'Elia, C Demetrescu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
182017
On-stack replacement, distilled
DC D'Elia, C Demetrescu
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
172018
ROPMate: Visually Assisting the Creation of ROP-based Exploits
M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ...
2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018
152018
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
P Borrello, E Coppa, DC D'Elia, C Demetrescu
34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019
132019
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
Software: Practice and Experience 46 (8), 1131-1152, 2016
102016
Memory models in symbolic execution: key ideas and new thoughts
L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu
Software Testing, Verification and Reliability 29 (8), 2019
92019
The Use of Likely Invariants as Feedback for Fuzzers
A Fioraldi, DC D’Elia, D Balzarotti
30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021
72021
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
P Borrello, E Coppa, DC D'Elia
51st Annual IEEE/IFIP International Conference on Dependable Systems and …, 2021
62021
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution
L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu
International Symposium on Cyber Security Cryptography and Machine Learning …, 2019
62019
SymNav: Visually Assisting Symbolic Execution
M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ...
62019
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
P Borrello, DC D'Elia, L Querzoni, C Giuffrida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20