Nilo Redini
Title
Cited by
Cited by
Year
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
522019
Bootstomp: on the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 781-798, 2017
402017
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
222020
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
142018
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
International Conference on Detection of Intrusions and Malware, and …, 2019
122019
Spider: Enabling fast patch propagation in related software repositories
A Machiry, N Redini, E Camellini, C Kruegel, G Vigna
2020 IEEE Symposium on Security and Privacy (SP), 1562-1579, 2020
112020
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks
E Gregori, A Improta, L Lenzini, V Luconi, N Redini, A Vecchio
Journal of Network and Computer Applications 64, 62-75, 2016
102016
Smartprobe: A bottleneck capacity estimation tool for smartphones
F Disperati, D Grassini, E Gregori, A Improta, L Lenzini, D Pellegrino, ...
2013 IEEE International Conference on Green Computing and Communications and …, 2013
62013
Conware: Automated Modeling of Hardware Peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
12021
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
42nd IEEE Symposium on Security and Privacy 2021, 2021
12021
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
Black Hat Asia, 2020
2020
Analyzing and Securing Firmware for IoT Devices
N Redini
University of California, Santa Barbara, 2020
2020
Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
2019
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
YR Choe, A Machiry, N Redini, ED Gustafson, Y Fratantonio, YR Choe, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2018
2018
Access control in distributed file systems: design and realization on Pepys fs
N Redini
2013
Access Control for the Pepys Internet-wide File-System
T Cucinotta, N Redini, G Dini
2012
The system can't perform the operation now. Try again later.
Articles 1–16