


default search action
Lorenzo Martignoni
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j2]Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi:
A methodology for testing CPU emulators. ACM Trans. Softw. Eng. Methodol. 22(4): 29:1-29:26 (2013) - 2012
- [c20]Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, Petros Maniatis:
Path-exploration lifting: hi-fi tests for lo-fi emulators. ASPLOS 2012: 337-348 - [c19]Lorenzo Martignoni, Pongsin Poosankam, Matei Zaharia, Jun Han, Stephen McCamant, Dawn Song, Vern Paxson, Adrian Perrig, Scott Shenker, Ion Stoica:
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. USENIX ATC 2012: 165-182 - 2011
- [c18]Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song:
Statically-directed dynamic automated test generation. ISSTA 2011: 12-22 - 2010
- [c17]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Conqueror: Tamper-Proof Code Execution on Legacy Systems. DIMVA 2010: 21-40 - [c16]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing system virtual machines. ISSTA 2010: 171-182 - [c15]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
N-version disassembly: differential testing of x86 disassemblers. ISSTA 2010: 265-274 - [c14]Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga
:
Dynamic and transparent analysis of commodity production systems. ASE 2010: 417-426 - [c13]Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro
:
Live and Trustworthy Forensic Analysis of Commodity Production Systems. RAID 2010: 297-316 - [c12]Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha:
Automatic Generation of Remediation Procedures for Malware Infections. USENIX Security Symposium 2010: 419-434 - [i1]Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga:
Dynamic and Transparent Analysis of Commodity Production Systems. CoRR abs/1006.5845 (2010)
2000 – 2009
- 2009
- [c11]Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Surgically Returning to Randomized lib(c). ACSAC 2009: 60-69 - [c10]Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni:
How Good Are Malware Detectors at Remediating Infected Systems?. DIMVA 2009: 21-37 - [c9]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
A Framework for Behavior-Based Malware Analysis in the Cloud. ICISS 2009: 178-192 - [c8]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing CPU emulators. ISSTA 2009: 261-272 - [c7]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. WOOT 2009: 1-7 - 2008
- [c6]Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi:
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. DIMVA 2008: 186-206 - [c5]Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson
, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. RAID 2008: 78-97 - 2007
- [j1]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
:
Code Normalization for Self-Mutating Malware. IEEE Secur. Priv. 5(2): 46-54 (2007) - [c4]Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha:
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. ACSAC 2007: 431-441 - [c3]Andrea Lanzi, Lorenzo Martignoni, Mattia Monga
, Roberto Paleari:
A Smart Fuzzer for x86 Executables. SESS@ICSE 2007: 7 - 2006
- [c2]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
:
Detecting Self-mutating Malware Using Control-Flow Graph Matching. DIMVA 2006: 129-143 - [c1]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga:
Using Code Normalization for Fighting Self-Mutating Malware. ISSSE 2006
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint