Danilo Bruschi
Danilo Bruschi
Professore di Informatica, Universitą degli Studi di Milano
Verified email at unimi.it
Title
Cited by
Cited by
Year
Secure pebblenets
S Basagni, K Herrin, D Bruschi, E Rosti
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
4162001
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
International conference on detection of intrusions and malware, and …, 2006
2362006
S-ARP: a secure address resolution protocol
D Bruschi, A Ornaghi, E Rosti
19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003
2172003
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
E Passerini, R Paleari, L Martignoni, D Bruschi
International conference on detection of intrusions and malware, and …, 2008
1732008
Lower bounds for the broadcast problem in mobile radio networks
D Bruschi, M Del Pinto
Distributed Computing 10 (3), 129-135, 1997
1491997
Voice over IPsec: Analysis and solutions
R Barbieri, D Bruschi, E Rosti
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
1452002
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
2009 Annual Computer Security Applications Conference, 60-69, 2009
1422009
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
S Basagni, D Bruschi, I Chlamtac
IEEE/ACM transactions on networking 7 (6), 799-807, 1999
1401999
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
R Paleari, L Martignoni, GF Roglia, D Bruschi
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) 41, 86, 2009
1392009
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
1062009
Secure multicast in wireless networks of mobile hosts: protocols and issues
D Bruschi, E Rosti
Mobile Networks and Applications 7 (6), 503-511, 2002
1002002
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
972007
Using code normalization for fighting self-mutating malware
D Bruschi, L Martignoni, M Monga
Proceedings of the international symposium on secure software engineering, 37-44, 2006
792006
Diversified process replicę for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
2007 IEEE International Performance, Computing, and Communications …, 2007
632007
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
International Conference on Information Systems Security, 178-192, 2009
612009
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
592005
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
552010
When hardware meets software: A bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
402012
A structural overview of NP optimization problems
D Bruschi, D Joseph, P Young
International Symposium on Optimal Algorithms, 205-231, 1989
391989
Conqueror: tamper-proof code execution on legacy systems
L Martignoni, R Paleari, D Bruschi
International Conference on Detection of Intrusions and Malware, and …, 2010
352010
The system can't perform the operation now. Try again later.
Articles 1–20