Secure pebblenets S Basagni, K Herrin, D Bruschi, E Rosti Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001 | 441 | 2001 |
Detecting self-mutating malware using control-flow graph matching D Bruschi, L Martignoni, M Monga Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006 | 317 | 2006 |
S-ARP: a secure address resolution protocol D Bruschi, A Ornaghi, E Rosti 19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003 | 273 | 2003 |
FluXOR: Detecting and Monitoring Fast-Flux Service Networks E Passerini, R Paleari, L Martignoni, D Bruschi Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 202 | 2008 |
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators R Paleari, L Martignoni, GF Roglia, D Bruschi Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) 41, 86, 2009 | 182 | 2009 |
Surgically returning to randomized lib (c) GF Roglia, L Martignoni, R Paleari, D Bruschi 2009 Annual Computer Security Applications Conference, 60-69, 2009 | 172 | 2009 |
Lower bounds for the broadcast problem in mobile radio networks D Bruschi, MD Pinto Distributed Computing 10, 129-135, 1997 | 162 | 1997 |
Testing CPU emulators L Martignoni, R Paleari, GF Roglia, D Bruschi Proceedings of the eighteenth international symposium on Software testing …, 2009 | 151 | 2009 |
A mobility-transparent deterministic broadcast mechanism for ad hoc networks S Basagni, D Bruschi, I Chlamtac IEEE/ACM transactions on networking 7 (6), 799-807, 1999 | 151 | 1999 |
Voice over IPsec: Analysis and solutions R Barbieri, D Bruschi, E Rosti 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 147 | 2002 |
Code normalization for self-mutating malware D Bruschi, L Martignoni, M Monga IEEE Security & Privacy 5 (2), 46-54, 2007 | 106 | 2007 |
Secure multicast in wireless networks of mobile hosts: protocols and issues D Bruschi, E Rosti Mobile Networks and Applications 7 (6), 503-511, 2002 | 99 | 2002 |
Using code normalization for fighting self-mutating malware D Bruschi, L Martignoni, M Monga Proceedings of the International Symposium on Secure Software Engineering, 37-44, 2006 | 85 | 2006 |
Diversified process replicæ for defeating memory error exploits D Bruschi, L Cavallaro, A Lanzi 2007 IEEE International Performance, Computing, and Communications …, 2007 | 76 | 2007 |
A framework for behavior-based malware analysis in the cloud L Martignoni, R Paleari, D Bruschi Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 74 | 2009 |
Testing system virtual machines L Martignoni, R Paleari, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on software testing and …, 2010 | 72 | 2010 |
Replay attack in TCG specification and solution D Bruschi, L Cavallaro, A Lanzi, M Monga 21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005 | 67 | 2005 |
When hardware meets software: A bulletproof solution to forensic memory acquisition A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi Proceedings of the 28th annual computer security applications conference, 79-88, 2012 | 57 | 2012 |
N-version disassembly: differential testing of x86 disassemblers R Paleari, L Martignoni, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on Software testing and …, 2010 | 39 | 2010 |
Conqueror: tamper-proof code execution on legacy systems L Martignoni, R Paleari, D Bruschi Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 39 | 2010 |