Follow
Roberto Paleari
Roberto Paleari
Unknown affiliation
Verified email at greyhats.it - Homepage
Title
Cited by
Cited by
Year
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
E Passerini, R Paleari, L Martignoni, D Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
2012008
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
R Paleari, L Martignoni, GF Roglia, D Bruschi
Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) 41, 86, 2009
1812009
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
2009 Annual Computer Security Applications Conference, 60-69, 2009
1712009
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
1502009
Live and trustworthy forensic analysis of commodity production systems
L Martignoni, A Fattori, R Paleari, L Cavallaro
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
772010
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
732009
Dynamic and transparent analysis of commodity production systems
A Fattori, R Paleari, L Martignoni, M Monga
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
722010
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on software testing and …, 2010
712010
Automatic Generation of Remediation Procedures for Malware Infections.
R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, JT Giffin, ...
USENIX Security Symposium, 419-434, 2010
522010
A smart fuzzer for x86 executables
A Lanzi, L Martignoni, M Monga, R Paleari
Third International Workshop on Software Engineering for Secure Systems …, 2007
492007
A hybrid analysis framework for detecting web application vulnerabilities
M Monga, R Paleari, E Passerini
2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009
432009
N-version disassembly: differential testing of x86 disassemblers
R Paleari, L Martignoni, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
392010
Conqueror: tamper-proof code execution on legacy systems
L Martignoni, R Paleari, D Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
392010
On race vulnerabilities in web applications
R Paleari, D Marrone, D Bruschi, M Monga
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
362008
A methodology for testing CPU emulators
L Martignoni, R Paleari, A Reina, GF Roglia, D Bruschi
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-26, 2013
142013
How good are malware detectors at remediating infected systems?
E Passerini, R Paleari, L Martignoni
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009
132009
Dealing with next-generation malware
R Paleari
Università degli Studi di Milano, 2011
82011
Static disassembly and analysis of malicious code
R Paleari
12007
Conqueror: Tamper-proof Code Execution on Legacy Systems
D Bruschi, L Martignoni, R Paleari
Universitätsbibliothek Dortmund, 2010
2010
On Race Vulnerabilities in Web Applications
D Bruschi, D Marrone, M Monga, R Paleari
DIMVA 2008, July 10-11, 2008, Paris, France, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20