FluXOR: Detecting and Monitoring Fast-Flux Service Networks E Passerini, R Paleari, L Martignoni, D Bruschi Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 201 | 2008 |
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators R Paleari, L Martignoni, GF Roglia, D Bruschi Proceedings of the USENIX Workshop on Offensive Technologies (WOOT) 41, 86, 2009 | 181 | 2009 |
Surgically returning to randomized lib (c) GF Roglia, L Martignoni, R Paleari, D Bruschi 2009 Annual Computer Security Applications Conference, 60-69, 2009 | 171 | 2009 |
Testing CPU emulators L Martignoni, R Paleari, GF Roglia, D Bruschi Proceedings of the eighteenth international symposium on Software testing …, 2009 | 150 | 2009 |
Live and trustworthy forensic analysis of commodity production systems L Martignoni, A Fattori, R Paleari, L Cavallaro Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 77 | 2010 |
A framework for behavior-based malware analysis in the cloud L Martignoni, R Paleari, D Bruschi Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 73 | 2009 |
Dynamic and transparent analysis of commodity production systems A Fattori, R Paleari, L Martignoni, M Monga Proceedings of the IEEE/ACM international conference on Automated software …, 2010 | 72 | 2010 |
Testing system virtual machines L Martignoni, R Paleari, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on software testing and …, 2010 | 71 | 2010 |
Automatic Generation of Remediation Procedures for Malware Infections. R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, JT Giffin, ... USENIX Security Symposium, 419-434, 2010 | 52 | 2010 |
A smart fuzzer for x86 executables A Lanzi, L Martignoni, M Monga, R Paleari Third International Workshop on Software Engineering for Secure Systems …, 2007 | 49 | 2007 |
A hybrid analysis framework for detecting web application vulnerabilities M Monga, R Paleari, E Passerini 2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009 | 43 | 2009 |
N-version disassembly: differential testing of x86 disassemblers R Paleari, L Martignoni, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on Software testing and …, 2010 | 39 | 2010 |
Conqueror: tamper-proof code execution on legacy systems L Martignoni, R Paleari, D Bruschi Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 39 | 2010 |
On race vulnerabilities in web applications R Paleari, D Marrone, D Bruschi, M Monga Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 36 | 2008 |
A methodology for testing CPU emulators L Martignoni, R Paleari, A Reina, GF Roglia, D Bruschi ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-26, 2013 | 14 | 2013 |
How good are malware detectors at remediating infected systems? E Passerini, R Paleari, L Martignoni Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009 | 13 | 2009 |
Dealing with next-generation malware R Paleari Università degli Studi di Milano, 2011 | 8 | 2011 |
Static disassembly and analysis of malicious code R Paleari | 1 | 2007 |
Conqueror: Tamper-proof Code Execution on Legacy Systems D Bruschi, L Martignoni, R Paleari Universitätsbibliothek Dortmund, 2010 | | 2010 |
On Race Vulnerabilities in Web Applications D Bruschi, D Marrone, M Monga, R Paleari DIMVA 2008, July 10-11, 2008, Paris, France, 2009 | | 2009 |