default search action
Daniele Cono D'Elia
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni:
Adversarial Attacks Against Binary Similarity Systems. IEEE Access 12: 161247-161269 (2024) - [c23]Cristian Assaiante, Simone Nicchi, Daniele Cono D'Elia, Leonardo Querzoni:
Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. DIMVA 2024: 150-173 - [c22]Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida:
Predictive Context-sensitive Fuzzing. NDSS 2024 - 2023
- [j6]Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro:
Designing Robust API Monitoring Solutions. IEEE Trans. Dependable Secur. Comput. 20(1): 392-406 (2023) - [c21]Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni:
Where Did My Variable Go? Poking Holes in Incomplete Debug Information. ASPLOS (2) 2023: 935-947 - [c20]Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida:
Uncontained: Uncovering Container Confusion in the Linux Kernel. USENIX Security Symposium 2023: 5055-5072 - [i9]Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni:
Adversarial Attacks against Binary Similarity Systems. CoRR abs/2303.11143 (2023) - 2022
- [j5]Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni:
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. DTRAP 3(2): 10:1-10:13 (2022) - [c19]Giacomo Priamo, Daniele Cono D'Elia, Leonardo Querzoni:
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. ASE 2022: 183:1-183:5 - [i8]Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni:
Where Did My Variable Go? Poking Holes in Incomplete Debug Information. CoRR abs/2211.09568 (2022) - 2021
- [c18]Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida:
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. CCS 2021: 715-733 - [c17]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. DSN 2021: 555-568 - [c16]Daniele Cono D'Elia, Lorenzo Invidia, Leonardo Querzoni:
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming. ESORICS (1) 2021: 197-217 - [c15]Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti:
The Use of Likely Invariants as Feedback for Fuzzers. USENIX Security Symposium 2021: 2829-2846 - [i7]Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, Cristiano Giuffrida:
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. CoRR abs/2104.10749 (2021) - 2020
- [j4]Daniele Cono D'Elia, Emilio Coppa, Federico Palmaro, Lorenzo Cavallaro:
On the Dissection of Evasive Malware. IEEE Trans. Inf. Forensics Secur. 15: 2750-2765 (2020) - [c14]Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa:
WEIZZ: automatic grey-box fuzzing for structured binary formats. ISSTA 2020: 1-13 - [c13]Andrea Fioraldi, Daniele Cono D'Elia, Leonardo Querzoni:
Fuzzing Binaries for Memory Safety Errors with QASan. SecDev 2020: 23-30 - [i6]Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro, Daniele Cono D'Elia:
Designing Robust API Monitoring Solutions. CoRR abs/2005.00323 (2020) - [i5]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia:
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. CoRR abs/2012.06658 (2020)
2010 – 2019
- 2019
- [j3]Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Memory models in symbolic execution: key ideas and new thoughts. Softw. Test. Verification Reliab. 29(8) (2019) - [c12]Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro:
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS 2019: 15-27 - [c11]Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. CSCML 2019: 121-140 - [c10]Daniele Cono D'Elia, Emilio Coppa, Andrea Salvati, Camil Demetrescu:
Static Analysis of ROP Code. EuroSec@EuroSys 2019: 2:1-2:6 - [c9]Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
The ROP needle: hiding trigger-based injection vectors via code reuse. SAC 2019: 1962-1970 - [c8]Marco Angelini, Graziano Blasilli, Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Simone Lenti, Simone Nicchi, Giuseppe Santucci:
SymNav: Visually Assisting Symbolic Execution. VizSEC 2019: 1-11 - [i4]Andrea Fioraldi, Daniele Cono D'Elia, Emilio Coppa:
WEIZZ: Automatic Grey-box Fuzzing for Structured Binary Formats. CoRR abs/1911.00621 (2019) - 2018
- [j2]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
A Survey of Symbolic Execution Techniques. ACM Comput. Surv. 51(3): 50:1-50:39 (2018) - [c7]Daniele Cono D'Elia, Camil Demetrescu:
On-stack replacement, distilled. PLDI 2018: 166-180 - [c6]Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci:
ROPMate: Visually Assisting the Creation of ROP-based Exploits. VizSEC 2018: 1-8 - 2017
- [b1]Daniele Cono D'Elia:
New techniques for adaptive program optimization. Sapienza University of Rome, Italy, 2017 - [c5]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Assisting Malware Analysis with Symbolic Execution: A Case Study. CSCML 2017: 171-188 - [c4]Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Rethinking pointer reasoning in symbolic execution. ASE 2017: 613-618 - [i3]Daniele Cono D'Elia, Camil Demetrescu:
On-Stack Replacement à la Carte. CoRR abs/1708.02512 (2017) - 2016
- [j1]Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
Mining hot calling contexts in small space. Softw. Pract. Exp. 46(8): 1131-1152 (2016) - [c3]Daniele Cono D'Elia, Camil Demetrescu:
Flexible on-stack replacement in LLVM. CGO 2016: 250-260 - [i2]Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
A Survey of Symbolic Execution Techniques. CoRR abs/1610.00502 (2016) - 2013
- [c2]Daniele Cono D'Elia, Camil Demetrescu:
Ball-Larus path profiling across multiple loop iterations. OOPSLA 2013: 373-390 - [i1]Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
Ball-Larus Path Profiling Across Multiple Loop iterations. CoRR abs/1304.5197 (2013) - 2011
- [c1]Daniele Cono D'Elia, Camil Demetrescu, Irene Finocchi:
Mining hot calling contexts in small space. PLDI 2011: 516-527
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint