Danilo Bruschi
Danilo Bruschi
Professore di Informatica, Università degli Studi di Milano
Email verificata su unimi.it
TitoloCitata daAnno
Secure pebblenets
S Basagni, K Herrin, D Bruschi, E Rosti
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
4002001
S-ARP: a secure address resolution protocol
D Bruschi, A Ornaghi, E Rosti
null, 66, 2003
1982003
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
International Conference on Detection of Intrusions and Malware, and …, 2006
1872006
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
E Passerini, R Paleari, L Martignoni, D Bruschi
International conference on detection of intrusions and malware, and …, 2008
1652008
Lower bounds for the broadcast problem in mobile radio networks
D Bruschi, M Del Pinto
Distributed Computing 10 (3), 129-135, 1997
1511997
Voice over IPsec: Analysis and solutions
R Barbieri, D Bruschi, E Rosti
Computer Security Applications Conference, 2002. Proceedings. 18th Annual …, 2002
1362002
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
S Basagni, D Bruschi, I Chlamtac
IEEE/ACM transactions on networking 7 (6), 799-807, 1999
1361999
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 60-69, 2009
1312009
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
R Paleari, L Martignoni, GF Roglia, D Bruschi
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) 41, 86, 2009
1122009
Secure multicast in wireless networks of mobile hosts: protocols and issues
D Bruschi, E Rosti
Mobile Networks and Applications 7 (6), 503-511, 2002
1042002
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
932009
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
832007
Using code normalization for fighting self-mutating malware
D Bruschi, L Martignoni, M Monga
Proceedings of the International Symposium on Secure Software Engineering, 37-44, 2006
752006
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
Computer Security Applications Conference, 21st Annual, 11 pp.-137, 2005
562005
Diversified process replicæ for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
Performance, Computing, and Communications Conference, 2007. IPCCC 2007 …, 2007
552007
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
International Conference on Information Systems Security, 178-192, 2009
522009
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
492010
A structural overview of NP optimization problems
D Bruschi, D Joseph, P Young
Optimal Algorithms, 205-231, 1989
381989
When hardware meets software: a bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
312012
Conqueror: tamper-proof code execution on legacy systems
L Martignoni, R Paleari, D Bruschi
International Conference on Detection of Intrusions and Malware, and …, 2010
282010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20