


default search action
BibTeX records: Daniele Cono D'Elia
@inproceedings{DBLP:conf/cgo/PriamoDPQ26,
author = {Giacomo Priamo and
Daniele Cono D'Elia and
Mathias Payer and
Leonardo Querzoni},
editor = {Stephen M. Blackburn and
Albert Cohen and
Timothy M. Jones},
title = {Towards Path-Aware Coverage-Guided Fuzzing},
booktitle = {{IEEE/ACM} International Symposium on Code Generation and Optimization,
{CGO} 2026, Sydney, Australia, January 31 - Feb. 4, 2026},
pages = {84--97},
publisher = {{IEEE}},
year = {2026},
url = {https://doi.org/10.1109/CGO68049.2026.11395191},
doi = {10.1109/CGO68049.2026.11395191},
timestamp = {Mon, 16 Mar 2026 15:34:52 +0100},
biburl = {https://dblp.org/rec/conf/cgo/PriamoDPQ26.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/AssaianteBKLDQ26,
author = {Cristian Assaiante and
Simone Di Biasio and
Snehasish Kumar and
Giuseppe Antonio Di Luna and
Daniele Cono D'Elia and
Leonardo Querzoni},
editor = {Stephen M. Blackburn and
Albert Cohen and
Timothy M. Jones},
title = {Towards Threading the Needle of Debuggable Optimized Binaries},
booktitle = {{IEEE/ACM} International Symposium on Code Generation and Optimization,
{CGO} 2026, Sydney, Australia, January 31 - Feb. 4, 2026},
pages = {711--725},
publisher = {{IEEE}},
year = {2026},
url = {https://doi.org/10.1109/CGO68049.2026.11395216},
doi = {10.1109/CGO68049.2026.11395216},
timestamp = {Tue, 24 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cgo/AssaianteBKLDQ26.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OzDTALU25,
author = {Harun Oz and
Daniele Cono D'Elia and
G{\"{u}}liz Seray Tuncay and
Abbas Acar and
Riccardo Lazzeretti and
Arif Selcuk Uluagac},
title = {With Great Power Comes Great Responsibility: Security and Privacy
Issues of Modern Browser Application Programming Interfaces},
journal = {{IEEE} Secur. Priv.},
volume = {23},
number = {2},
pages = {52--60},
year = {2025},
url = {https://doi.org/10.1109/MSEC.2024.3443625},
doi = {10.1109/MSEC.2024.3443625},
timestamp = {Sun, 15 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieeesp/OzDTALU25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmrep/DEliaDGMPPPSSV25,
author = {Daniele Cono D'Elia and
Thaleia Dimitra Doudali and
Cristiano Giuffrida and
Miguel Matos and
Mathias Payer and
Solal Pirelli and
Georgios Portokalidis and
Valerio Schiavoni and
Salvatore Signorello and
Anjo Vahldiek{-}Oberwagner},
title = {Lessons Learned from Five Years of Artifact Evaluations at EuroSys},
booktitle = {Proceedings of the 3rd {ACM} Conference on Reproducibility and Replicability,
{ACM} {REP} 2025, Vancouver, Canada, July 29-31, 2025},
pages = {108--120},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3736731.3746152},
doi = {10.1145/3736731.3746152},
timestamp = {Fri, 26 Dec 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acmrep/DEliaDGMPPPSSV25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/PietroDQ25,
author = {Giorgia Di Pietro and
Daniele Cono D'Elia and
Leonardo Querzoni},
title = {Can You Run My Code? {A} Close Look at Process Injection in Windows
Malware},
booktitle = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
pages = {1600--1616},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3708821.3736206},
doi = {10.1145/3708821.3736206},
timestamp = {Wed, 15 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/asiaccs/PietroDQ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BotturaPYDQ25,
author = {Nicola Bottura and
Giorgia Di Pietro and
Yuya Yamada and
Daniele Cono D'Elia and
Leonardo Querzoni},
editor = {Manuel Egele and
Veelasha Moonsamy and
Daniel Gruss and
Michele Carminati},
title = {Poster: All Right Then, (Don't) Keep Your Secrets: Exposing {API}
Hashing in Malware},
booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
- 22nd International Conference, {DIMVA} 2025, Graz, Austria, July
9-11, 2025, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
pages = {287--293},
publisher = {Springer},
year = {2025},
url = {https://doi.org/10.1007/978-3-031-97620-9\_16},
doi = {10.1007/978-3-031-97620-9\_16},
timestamp = {Tue, 24 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/dimva/BotturaPYDQ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MurtasDLFQS25,
author = {Andrea De Murtas and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Pascal Felber and
Leonardo Querzoni and
Valerio Schiavoni},
title = {ConfBench: {A} Tool for Easy Evaluation of Confidential Virtual Machines},
booktitle = {55th Annual {IEEE/IFIP} International Conference on Dependable Systems
and Networks, {DSN} 2025, Naples, Italy, June 23-26, 2025},
pages = {279--288},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/DSN64029.2025.00038},
doi = {10.1109/DSN64029.2025.00038},
timestamp = {Mon, 21 Jul 2025 09:22:54 +0200},
biburl = {https://dblp.org/rec/conf/dsn/MurtasDLFQS25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CapozziTWYDLCQ25,
author = {Gianluca Capozzi and
Tong Tang and
Jie Wan and
Ziqi Yang and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Lorenzo Cavallaro and
Leonardo Querzoni},
title = {On the Lack of Robustness of Binary Function Similarity Systems},
booktitle = {10th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2025, Venice, Italy, June 30 - July 4, 2025},
pages = {980--1001},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/EuroSP63326.2025.00060},
doi = {10.1109/EUROSP63326.2025.00060},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/eurosp/CapozziTWYDLCQ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BotturaDQ25,
author = {Nicola Bottura and
Daniele Cono D'Elia and
Leonardo Querzoni},
title = {Pfuzzer: Practical, Sound, and Effective Multi-path Analysis of Environment-sensitive
Malware with Coverage-guided Fuzzing},
booktitle = {10th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
2025, Venice, Italy, June 30 - July 4, 2025},
pages = {1121--1139},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/EuroSP63326.2025.00068},
doi = {10.1109/EUROSP63326.2025.00068},
timestamp = {Tue, 24 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/eurosp/BotturaDQ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MariniDPQ25,
author = {Matteo Marini and
Daniele Cono D'Elia and
Mathias Payer and
Leonardo Querzoni},
title = {QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing},
booktitle = {32nd Annual Network and Distributed System Security Symposium, {NDSS}
2025, San Diego, California, USA, February 24-28, 2025},
publisher = {The Internet Society},
year = {2025},
url = {https://www.ndss-symposium.org/ndss-paper/qmsan-efficiently-detecting-uninitialized-memory-errors-during-fuzzing/},
timestamp = {Wed, 19 Mar 2025 10:59:04 +0100},
biburl = {https://dblp.org/rec/conf/ndss/MariniDPQ25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CapozziDLQ24,
author = {Gianluca Capozzi and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Leonardo Querzoni},
title = {Adversarial Attacks Against Binary Similarity Systems},
journal = {{IEEE} Access},
volume = {12},
pages = {161247--161269},
year = {2024},
url = {https://doi.org/10.1109/ACCESS.2024.3488204},
doi = {10.1109/ACCESS.2024.3488204},
timestamp = {Sat, 30 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/CapozziDLQ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/AssaianteNDQ24,
author = {Cristian Assaiante and
Simone Nicchi and
Daniele Cono D'Elia and
Leonardo Querzoni},
editor = {Federico Maggi and
Manuel Egele and
Mathias Payer and
Michele Carminati},
title = {Evading Userland {API} Hooking, Again: Novel Attacks and a Principled
Defense Method},
booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
- 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
July 17-19, 2024, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {150--173},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-64171-8\_8},
doi = {10.1007/978-3-031-64171-8\_8},
timestamp = {Mon, 19 May 2025 13:59:01 +0200},
biburl = {https://dblp.org/rec/conf/dimva/AssaianteNDQ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BorrelloFDBQG24,
author = {Pietro Borrello and
Andrea Fioraldi and
Daniele Cono D'Elia and
Davide Balzarotti and
Leonardo Querzoni and
Cristiano Giuffrida},
title = {Predictive Context-sensitive Fuzzing},
booktitle = {31st Annual Network and Distributed System Security Symposium, {NDSS}
2024, San Diego, California, USA, February 26 - March 1, 2024},
publisher = {The Internet Society},
year = {2024},
url = {https://www.ndss-symposium.org/ndss-paper/predictive-context-sensitive-fuzzing/},
timestamp = {Tue, 24 Sep 2024 17:08:58 +0200},
biburl = {https://dblp.org/rec/conf/ndss/BorrelloFDBQG24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2412-04163,
author = {Gianluca Capozzi and
Tong Tang and
Jie Wan and
Ziqi Yang and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Lorenzo Cavallaro and
Leonardo Querzoni},
title = {On the Lack of Robustness of Binary Function Similarity Systems},
journal = {CoRR},
volume = {abs/2412.04163},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2412.04163},
doi = {10.48550/ARXIV.2412.04163},
eprinttype = {arXiv},
eprint = {2412.04163},
timestamp = {Sat, 06 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2412-04163.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DEliaNMMP23,
author = {Daniele Cono D'Elia and
Simone Nicchi and
Matteo Mariani and
Matteo Marini and
Federico Palmaro},
title = {Designing Robust {API} Monitoring Solutions},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {20},
number = {1},
pages = {392--406},
year = {2023},
url = {https://doi.org/10.1109/TDSC.2021.3133729},
doi = {10.1109/TDSC.2021.3133729},
timestamp = {Tue, 21 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdsc/DEliaNMMP23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/AssaianteDLQ23,
author = {Cristian Assaiante and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Leonardo Querzoni},
editor = {Tor M. Aamodt and
Natalie D. Enright Jerger and
Michael M. Swift},
title = {Where Did My Variable Go? Poking Holes in Incomplete Debug Information},
booktitle = {Proceedings of the 28th {ACM} International Conference on Architectural
Support for Programming Languages and Operating Systems, Volume 2,
{ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023},
pages = {935--947},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3575693.3575720},
doi = {10.1145/3575693.3575720},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asplos/AssaianteDLQ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoschelBDBG23,
author = {Jakob Koschel and
Pietro Borrello and
Daniele Cono D'Elia and
Herbert Bos and
Cristiano Giuffrida},
editor = {Joseph A. Calandrino and
Carmela Troncoso},
title = {Uncontained: Uncovering Container Confusion in the Linux Kernel},
booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
CA, USA, August 9-11, 2023},
pages = {5055--5072},
publisher = {{USENIX} Association},
year = {2023},
url = {https://www.usenix.org/conference/usenixsecurity23/presentation/koschel},
timestamp = {Wed, 18 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/uss/KoschelBDBG23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-11143,
author = {Gianluca Capozzi and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Leonardo Querzoni},
title = {Adversarial Attacks against Binary Similarity Systems},
journal = {CoRR},
volume = {abs/2303.11143},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2303.11143},
doi = {10.48550/ARXIV.2303.11143},
eprinttype = {arXiv},
eprint = {2303.11143},
timestamp = {Sat, 06 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2303-11143.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DEliaIPQ22,
author = {Daniele Cono D'Elia and
Lorenzo Invidia and
Federico Palmaro and
Leonardo Querzoni},
title = {Evaluating Dynamic Binary Instrumentation Systems for Conspicuous
Features and Artifacts},
journal = {{DTRAP}},
volume = {3},
number = {2},
pages = {10:1--10:13},
year = {2022},
url = {https://doi.org/10.1145/3478520},
doi = {10.1145/3478520},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/dtrap/DEliaIPQ22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/PriamoDQ22,
author = {Giacomo Priamo and
Daniele Cono D'Elia and
Leonardo Querzoni},
title = {Principled Composition of Function Variants for Dynamic Software Diversity
and Program Protection},
booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
pages = {183:1--183:5},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3551349.3559553},
doi = {10.1145/3551349.3559553},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/PriamoDQ22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-09568,
author = {Cristian Assaiante and
Daniele Cono D'Elia and
Giuseppe Antonio Di Luna and
Leonardo Querzoni},
title = {Where Did My Variable Go? Poking Holes in Incomplete Debug Information},
journal = {CoRR},
volume = {abs/2211.09568},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2211.09568},
doi = {10.48550/ARXIV.2211.09568},
eprinttype = {arXiv},
eprint = {2211.09568},
timestamp = {Sun, 04 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2211-09568.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BorrelloDQG21,
author = {Pietro Borrello and
Daniele Cono D'Elia and
Leonardo Querzoni and
Cristiano Giuffrida},
editor = {Yongdae Kim and
Jong Kim and
Giovanni Vigna and
Elaine Shi},
title = {Constantine: Automatic Side-Channel Resistance Using Efficient Control
and Data Flow Linearization},
booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
pages = {715--733},
publisher = {{ACM}},
year = {2021},
url = {https://doi.org/10.1145/3460120.3484583},
doi = {10.1145/3460120.3484583},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/BorrelloDQG21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BorrelloCD21,
author = {Pietro Borrello and
Emilio Coppa and
Daniele Cono D'Elia},
title = {Hiding in the Particles: When Return-Oriented Programming Meets Program
Obfuscation},
booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
pages = {555--568},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/DSN48987.2021.00064},
doi = {10.1109/DSN48987.2021.00064},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/dsn/BorrelloCD21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DEliaIQ21,
author = {Daniele Cono D'Elia and
Lorenzo Invidia and
Leonardo Querzoni},
editor = {Elisa Bertino and
Haya Schulmann and
Michael Waidner},
title = {Rope: Covert Multi-process Malware Execution with Return-Oriented
Programming},
booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
pages = {197--217},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-88418-5\_10},
doi = {10.1007/978-3-030-88418-5\_10},
timestamp = {Tue, 17 Oct 2023 10:41:56 +0200},
biburl = {https://dblp.org/rec/conf/esorics/DEliaIQ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FioraldiDB21,
author = {Andrea Fioraldi and
Daniele Cono D'Elia and
Davide Balzarotti},
editor = {Michael D. Bailey and
Rachel Greenstadt},
title = {The Use of Likely Invariants as Feedback for Fuzzers},
booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
2021},
pages = {2829--2846},
publisher = {{USENIX} Association},
year = {2021},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fioraldi},
timestamp = {Mon, 20 Nov 2023 08:57:49 +0100},
biburl = {https://dblp.org/rec/conf/uss/FioraldiDB21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-10749,
author = {Pietro Borrello and
Daniele Cono D'Elia and
Leonardo Querzoni and
Cristiano Giuffrida},
title = {Constantine: Automatic Side-Channel Resistance Using Efficient Control
and Data Flow Linearization},
journal = {CoRR},
volume = {abs/2104.10749},
year = {2021},
url = {https://arxiv.org/abs/2104.10749},
eprinttype = {arXiv},
eprint = {2104.10749},
timestamp = {Tue, 27 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2104-10749.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DEliaCPC20,
author = {Daniele Cono D'Elia and
Emilio Coppa and
Federico Palmaro and
Lorenzo Cavallaro},
title = {On the Dissection of Evasive Malware},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {15},
pages = {2750--2765},
year = {2020},
url = {https://doi.org/10.1109/TIFS.2020.2976559},
doi = {10.1109/TIFS.2020.2976559},
timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tifs/DEliaCPC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/FioraldiDC20,
author = {Andrea Fioraldi and
Daniele Cono D'Elia and
Emilio Coppa},
editor = {Sarfraz Khurshid and
Corina S. Pasareanu},
title = {{WEIZZ:} automatic grey-box fuzzing for structured binary formats},
booktitle = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software
Testing and Analysis, Virtual Event, USA, July 18-22, 2020},
pages = {1--13},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3395363.3397372},
doi = {10.1145/3395363.3397372},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/issta/FioraldiDC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FioraldiDQ20,
author = {Andrea Fioraldi and
Daniele Cono D'Elia and
Leonardo Querzoni},
title = {Fuzzing Binaries for Memory Safety Errors with QASan},
booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
28-30, 2020},
pages = {23--30},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/SecDev45635.2020.00019},
doi = {10.1109/SECDEV45635.2020.00019},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/secdev/FioraldiDQ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00323,
author = {Simone Nicchi and
Matteo Mariani and
Matteo Marini and
Federico Palmaro and
Daniele Cono D'Elia},
title = {Designing Robust {API} Monitoring Solutions},
journal = {CoRR},
volume = {abs/2005.00323},
year = {2020},
url = {https://arxiv.org/abs/2005.00323},
eprinttype = {arXiv},
eprint = {2005.00323},
timestamp = {Fri, 08 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2005-00323.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06658,
author = {Pietro Borrello and
Emilio Coppa and
Daniele Cono D'Elia},
title = {Hiding in the Particles: When Return-Oriented Programming Meets Program
Obfuscation},
journal = {CoRR},
volume = {abs/2012.06658},
year = {2020},
url = {https://arxiv.org/abs/2012.06658},
eprinttype = {arXiv},
eprint = {2012.06658},
timestamp = {Sat, 02 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2012-06658.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/BorzacchielloCD19,
author = {Luca Borzacchiello and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu},
title = {Memory models in symbolic execution: key ideas and new thoughts},
journal = {Softw. Test. Verification Reliab.},
volume = {29},
number = {8},
year = {2019},
url = {https://doi.org/10.1002/stvr.1722},
doi = {10.1002/STVR.1722},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/stvr/BorzacchielloCD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DEliaCNPC19,
author = {Daniele Cono D'Elia and
Emilio Coppa and
Simone Nicchi and
Federico Palmaro and
Lorenzo Cavallaro},
editor = {Steven D. Galbraith and
Giovanni Russello and
Willy Susilo and
Dieter Gollmann and
Engin Kirda and
Zhenkai Liang},
title = {SoK: Using Dynamic Binary Instrumentation for Security (And How You
May Get Caught Red Handed)},
booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
pages = {15--27},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3321705.3329819},
doi = {10.1145/3321705.3329819},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/DEliaCNPC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BorzacchielloCD19,
author = {Luca Borzacchiello and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Shlomi Dolev and
Danny Hendler and
Sachin Lodha and
Moti Yung},
title = {Reconstructing {C2} Servers for Remote Access Trojans with Symbolic
Execution},
booktitle = {Cyber Security Cryptography and Machine Learning - Third International
Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {121--140},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-20951-3\_12},
doi = {10.1007/978-3-030-20951-3\_12},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cscml/BorzacchielloCD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/DEliaCSD19,
author = {Daniele Cono D'Elia and
Emilio Coppa and
Andrea Salvati and
Camil Demetrescu},
title = {Static Analysis of {ROP} Code},
booktitle = {Proceedings of the 12th European Workshop on Systems Security, EuroSec@EuroSys
2019, Dresden, Germany, March 25, 2019},
pages = {2:1--2:6},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3301417.3312494},
doi = {10.1145/3301417.3312494},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/eurosec/DEliaCSD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BorrelloCDD19,
author = {Pietro Borrello and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Chih{-}Cheng Hung and
George A. Papadopoulos},
title = {The {ROP} needle: hiding trigger-based injection vectors via code
reuse},
booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
{SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
pages = {1962--1970},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3297280.3297472},
doi = {10.1145/3297280.3297472},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sac/BorrelloCDD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDDLN19,
author = {Marco Angelini and
Graziano Blasilli and
Luca Borzacchiello and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu and
Simone Lenti and
Simone Nicchi and
Giuseppe Santucci},
editor = {Robert Gove and
Dustin Arendt and
J{\"{o}}rn Kohlhammer and
Marco Angelini and
Celeste Lyn Paul and
Chris Bryan and
Sean McKenna and
Nicolas Prigent and
Parnian Najafi and
Awalin Sopan},
title = {SymNav: Visually Assisting Symbolic Execution},
booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
2019, Vancouver, BC, Canada, October 23, 2019},
pages = {1--11},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/VizSec48167.2019.9161524},
doi = {10.1109/VIZSEC48167.2019.9161524},
timestamp = {Tue, 21 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDDLN19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-00621,
author = {Andrea Fioraldi and
Daniele Cono D'Elia and
Emilio Coppa},
title = {{WEIZZ:} Automatic Grey-box Fuzzing for Structured Binary Formats},
journal = {CoRR},
volume = {abs/1911.00621},
year = {2019},
url = {http://arxiv.org/abs/1911.00621},
eprinttype = {arXiv},
eprint = {1911.00621},
timestamp = {Mon, 11 Nov 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1911-00621.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BaldoniCDDF18,
author = {Roberto Baldoni and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi},
title = {A Survey of Symbolic Execution Techniques},
journal = {{ACM} Comput. Surv.},
volume = {51},
number = {3},
pages = {50:1--50:39},
year = {2018},
url = {https://doi.org/10.1145/3182657},
doi = {10.1145/3182657},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/csur/BaldoniCDDF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/DEliaD18,
author = {Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Jeffrey S. Foster and
Dan Grossman},
title = {On-stack replacement, distilled},
booktitle = {Proceedings of the 39th {ACM} {SIGPLAN} Conference on Programming
Language Design and Implementation, {PLDI} 2018, Philadelphia, PA,
USA, June 18-22, 2018},
pages = {166--180},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3192366.3192396},
doi = {10.1145/3192366.3192396},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/pldi/DEliaD18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDFLS18,
author = {Marco Angelini and
Graziano Blasilli and
Pietro Borrello and
Emilio Coppa and
Daniele Cono D'Elia and
Serena Ferracci and
Simone Lenti and
Giuseppe Santucci},
editor = {Diane Staheli and
Celeste Lyn Paul and
J{\"{o}}rn Kohlhammer and
Daniel M. Best and
Stoney Trent and
Nicolas Prigent and
Robert Gove and
Graig Sauer},
title = {ROPMate: Visually Assisting the Creation of ROP-based Exploits},
booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
2018, Berlin, Germany, October 22, 2018},
pages = {1--8},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/VIZSEC.2018.8709204},
doi = {10.1109/VIZSEC.2018.8709204},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDFLS18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ita17,
author = {Daniele Cono D'Elia},
title = {New techniques for adaptive program optimization},
school = {Sapienza University of Rome, Italy},
year = {2017},
url = {http://hdl.handle.net/11573/876041},
timestamp = {Mon, 02 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/phd/basesearch/Ita17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BaldoniCDD17,
author = {Roberto Baldoni and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Shlomi Dolev and
Sachin Lodha},
title = {Assisting Malware Analysis with Symbolic Execution: {A} Case Study},
booktitle = {Cyber Security Cryptography and Machine Learning - First International
Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {171--188},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-60080-2\_12},
doi = {10.1007/978-3-319-60080-2\_12},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cscml/BaldoniCDD17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/CoppaDD17,
author = {Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Grigore Rosu and
Massimiliano Di Penta and
Tien N. Nguyen},
title = {Rethinking pointer reasoning in symbolic execution},
booktitle = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
03, 2017},
pages = {613--618},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/ASE.2017.8115671},
doi = {10.1109/ASE.2017.8115671},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/CoppaDD17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02512,
author = {Daniele Cono D'Elia and
Camil Demetrescu},
title = {On-Stack Replacement {\`{a}} la Carte},
journal = {CoRR},
volume = {abs/1708.02512},
year = {2017},
url = {http://arxiv.org/abs/1708.02512},
eprinttype = {arXiv},
eprint = {1708.02512},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1708-02512.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/DEliaDF16,
author = {Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi},
title = {Mining hot calling contexts in small space},
journal = {Softw. Pract. Exp.},
volume = {46},
number = {8},
pages = {1131--1152},
year = {2016},
url = {https://doi.org/10.1002/spe.2348},
doi = {10.1002/SPE.2348},
timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/spe/DEliaDF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/DEliaD16,
author = {Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Bj{\"{o}}rn Franke and
Youfeng Wu and
Fabrice Rastello},
title = {Flexible on-stack replacement in {LLVM}},
booktitle = {Proceedings of the 2016 International Symposium on Code Generation
and Optimization, {CGO} 2016, Barcelona, Spain, March 12-18, 2016},
pages = {250--260},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2854038.2854061},
doi = {10.1145/2854038.2854061},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cgo/DEliaD16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BaldoniCDDF16,
author = {Roberto Baldoni and
Emilio Coppa and
Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi},
title = {A Survey of Symbolic Execution Techniques},
journal = {CoRR},
volume = {abs/1610.00502},
year = {2016},
url = {http://arxiv.org/abs/1610.00502},
eprinttype = {arXiv},
eprint = {1610.00502},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/BaldoniCDDF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/DEliaD13,
author = {Daniele Cono D'Elia and
Camil Demetrescu},
editor = {Antony L. Hosking and
Patrick Th. Eugster and
Cristina V. Lopes},
title = {Ball-Larus path profiling across multiple loop iterations},
booktitle = {Proceedings of the 2013 {ACM} {SIGPLAN} International Conference on
Object Oriented Programming Systems Languages {\&} Applications,
{OOPSLA} 2013, part of {SPLASH} 2013, Indianapolis, IN, USA, October
26-31, 2013},
pages = {373--390},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2509136.2509521},
doi = {10.1145/2509136.2509521},
timestamp = {Sun, 06 Oct 2024 21:12:41 +0200},
biburl = {https://dblp.org/rec/conf/oopsla/DEliaD13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-5197,
author = {Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi},
title = {Ball-Larus Path Profiling Across Multiple Loop iterations},
journal = {CoRR},
volume = {abs/1304.5197},
year = {2013},
url = {http://arxiv.org/abs/1304.5197},
eprinttype = {arXiv},
eprint = {1304.5197},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1304-5197.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/DEliaDF11,
author = {Daniele Cono D'Elia and
Camil Demetrescu and
Irene Finocchi},
editor = {Mary W. Hall and
David A. Padua},
title = {Mining hot calling contexts in small space},
booktitle = {Proceedings of the 32nd {ACM} {SIGPLAN} Conference on Programming
Language Design and Implementation, {PLDI} 2011, San Jose, CA, USA,
June 4-8, 2011},
pages = {516--527},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/1993498.1993559},
doi = {10.1145/1993498.1993559},
timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pldi/DEliaDF11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













