Follow
Daniele Cono D'Elia
Title
Cited by
Cited by
Year
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'Elia, C Demetrescu, I Finocchi
ACM Computing Surveys 51 (3), 2018
7892018
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
642019
Weizz: Automatic grey-box fuzzing for structured binary formats
A Fioraldi, DC D'Elia, E Coppa
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
592020
On the Dissection of Evasive Malware
DC D’Elia, E Coppa, F Palmaro, L Cavallaro
IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020
502020
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
P Borrello, DC D'Elia, L Querzoni, C Giuffrida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
472021
The Use of Likely Invariants as Feedback for Fuzzers
A Fioraldi, DC D’Elia, D Balzarotti
30th USENIX Security Symposium (USENIX Security 2021), 2829-2846, 2021
392021
Fuzzing Binaries for Memory Safety Errors with QASan
A Fioraldi, DC D’Elia, L Querzoni
IEEE Secure Development Conference (SecDev) 2020, 2020
392020
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
ACM SIGPLAN Notices 46 (6), 516-527, 2011
382011
Assisting malware analysis with symbolic execution: A case study
R Baldoni, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: First International …, 2017
362017
Flexible on-stack replacement in LLVM
DC D'Elia, C Demetrescu
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
262016
On-stack replacement, distilled
DC D'Elia, C Demetrescu
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
252018
Rethinking pointer reasoning in symbolic execution
E Coppa, DC D'Elia, C Demetrescu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
242017
Memory models in symbolic execution: key ideas and new thoughts
L Borzacchiello, E Coppa, DC D'Elia, C Demetrescu
Software Testing, Verification and Reliability 29 (8), 2019
232019
Ball-larus path profiling across multiple loop iterations
DC D'Elia, C Demetrescu
ACM SIGPLAN Notices 48 (10), 373-390, 2013
222013
ROPMate: Visually Assisting the Creation of ROP-based Exploits
M Angelini, G Blasilli, P Borrello, E Coppa, DC D’Elia, S Ferracci, S Lenti, ...
2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2018
202018
SymNav: Visually Assisting Symbolic Execution
M Angelini, G Blasilli, L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu, ...
172019
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
P Borrello, E Coppa, DC D'Elia, C Demetrescu
34th ACM/SIGAPP Symposium On Applied Computing. Limassol, Cyprus, 2019
152019
Reconstructing C2 servers for remote access trojans with symbolic execution
L Borzacchiello, E Coppa, DC D’Elia, C Demetrescu
Cyber Security Cryptography and Machine Learning: Third International …, 2019
122019
Mining hot calling contexts in small space
DC D'Elia, C Demetrescu, I Finocchi
Software: Practice and Experience 46 (8), 1131-1152, 2016
122016
Evaluating dynamic binary instrumentation systems for conspicuous features and artifacts
DC D’Elia, L Invidia, F Palmaro, L Querzoni
Digital Threats: Research and Practice (DTRAP) 3 (2), 1-13, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20