BibTeX records: Daniele Cono D'Elia

download as .bib file

@inproceedings{DBLP:conf/cgo/PriamoDPQ26,
  author       = {Giacomo Priamo and
                  Daniele Cono D'Elia and
                  Mathias Payer and
                  Leonardo Querzoni},
  editor       = {Stephen M. Blackburn and
                  Albert Cohen and
                  Timothy M. Jones},
  title        = {Towards Path-Aware Coverage-Guided Fuzzing},
  booktitle    = {{IEEE/ACM} International Symposium on Code Generation and Optimization,
                  {CGO} 2026, Sydney, Australia, January 31 - Feb. 4, 2026},
  pages        = {84--97},
  publisher    = {{IEEE}},
  year         = {2026},
  url          = {https://doi.org/10.1109/CGO68049.2026.11395191},
  doi          = {10.1109/CGO68049.2026.11395191},
  timestamp    = {Mon, 16 Mar 2026 15:34:52 +0100},
  biburl       = {https://dblp.org/rec/conf/cgo/PriamoDPQ26.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/AssaianteBKLDQ26,
  author       = {Cristian Assaiante and
                  Simone Di Biasio and
                  Snehasish Kumar and
                  Giuseppe Antonio Di Luna and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  editor       = {Stephen M. Blackburn and
                  Albert Cohen and
                  Timothy M. Jones},
  title        = {Towards Threading the Needle of Debuggable Optimized Binaries},
  booktitle    = {{IEEE/ACM} International Symposium on Code Generation and Optimization,
                  {CGO} 2026, Sydney, Australia, January 31 - Feb. 4, 2026},
  pages        = {711--725},
  publisher    = {{IEEE}},
  year         = {2026},
  url          = {https://doi.org/10.1109/CGO68049.2026.11395216},
  doi          = {10.1109/CGO68049.2026.11395216},
  timestamp    = {Tue, 24 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgo/AssaianteBKLDQ26.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/OzDTALU25,
  author       = {Harun Oz and
                  Daniele Cono D'Elia and
                  G{\"{u}}liz Seray Tuncay and
                  Abbas Acar and
                  Riccardo Lazzeretti and
                  Arif Selcuk Uluagac},
  title        = {With Great Power Comes Great Responsibility: Security and Privacy
                  Issues of Modern Browser Application Programming Interfaces},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {23},
  number       = {2},
  pages        = {52--60},
  year         = {2025},
  url          = {https://doi.org/10.1109/MSEC.2024.3443625},
  doi          = {10.1109/MSEC.2024.3443625},
  timestamp    = {Sun, 15 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/OzDTALU25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmrep/DEliaDGMPPPSSV25,
  author       = {Daniele Cono D'Elia and
                  Thaleia Dimitra Doudali and
                  Cristiano Giuffrida and
                  Miguel Matos and
                  Mathias Payer and
                  Solal Pirelli and
                  Georgios Portokalidis and
                  Valerio Schiavoni and
                  Salvatore Signorello and
                  Anjo Vahldiek{-}Oberwagner},
  title        = {Lessons Learned from Five Years of Artifact Evaluations at EuroSys},
  booktitle    = {Proceedings of the 3rd {ACM} Conference on Reproducibility and Replicability,
                  {ACM} {REP} 2025, Vancouver, Canada, July 29-31, 2025},
  pages        = {108--120},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3736731.3746152},
  doi          = {10.1145/3736731.3746152},
  timestamp    = {Fri, 26 Dec 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acmrep/DEliaDGMPPPSSV25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/PietroDQ25,
  author       = {Giorgia Di Pietro and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  title        = {Can You Run My Code? {A} Close Look at Process Injection in Windows
                  Malware},
  booktitle    = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
  pages        = {1600--1616},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3708821.3736206},
  doi          = {10.1145/3708821.3736206},
  timestamp    = {Wed, 15 Oct 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/PietroDQ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BotturaPYDQ25,
  author       = {Nicola Bottura and
                  Giorgia Di Pietro and
                  Yuya Yamada and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  editor       = {Manuel Egele and
                  Veelasha Moonsamy and
                  Daniel Gruss and
                  Michele Carminati},
  title        = {Poster: All Right Then, (Don't) Keep Your Secrets: Exposing {API}
                  Hashing in Malware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 22nd International Conference, {DIMVA} 2025, Graz, Austria, July
                  9-11, 2025, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  pages        = {287--293},
  publisher    = {Springer},
  year         = {2025},
  url          = {https://doi.org/10.1007/978-3-031-97620-9\_16},
  doi          = {10.1007/978-3-031-97620-9\_16},
  timestamp    = {Tue, 24 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/BotturaPYDQ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MurtasDLFQS25,
  author       = {Andrea De Murtas and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Pascal Felber and
                  Leonardo Querzoni and
                  Valerio Schiavoni},
  title        = {ConfBench: {A} Tool for Easy Evaluation of Confidential Virtual Machines},
  booktitle    = {55th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2025, Naples, Italy, June 23-26, 2025},
  pages        = {279--288},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/DSN64029.2025.00038},
  doi          = {10.1109/DSN64029.2025.00038},
  timestamp    = {Mon, 21 Jul 2025 09:22:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/MurtasDLFQS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CapozziTWYDLCQ25,
  author       = {Gianluca Capozzi and
                  Tong Tang and
                  Jie Wan and
                  Ziqi Yang and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Lorenzo Cavallaro and
                  Leonardo Querzoni},
  title        = {On the Lack of Robustness of Binary Function Similarity Systems},
  booktitle    = {10th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2025, Venice, Italy, June 30 - July 4, 2025},
  pages        = {980--1001},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/EuroSP63326.2025.00060},
  doi          = {10.1109/EUROSP63326.2025.00060},
  timestamp    = {Sat, 15 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/CapozziTWYDLCQ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BotturaDQ25,
  author       = {Nicola Bottura and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  title        = {Pfuzzer: Practical, Sound, and Effective Multi-path Analysis of Environment-sensitive
                  Malware with Coverage-guided Fuzzing},
  booktitle    = {10th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2025, Venice, Italy, June 30 - July 4, 2025},
  pages        = {1121--1139},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/EuroSP63326.2025.00068},
  doi          = {10.1109/EUROSP63326.2025.00068},
  timestamp    = {Tue, 24 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/BotturaDQ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MariniDPQ25,
  author       = {Matteo Marini and
                  Daniele Cono D'Elia and
                  Mathias Payer and
                  Leonardo Querzoni},
  title        = {QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing},
  booktitle    = {32nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2025, San Diego, California, USA, February 24-28, 2025},
  publisher    = {The Internet Society},
  year         = {2025},
  url          = {https://www.ndss-symposium.org/ndss-paper/qmsan-efficiently-detecting-uninitialized-memory-errors-during-fuzzing/},
  timestamp    = {Wed, 19 Mar 2025 10:59:04 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MariniDPQ25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CapozziDLQ24,
  author       = {Gianluca Capozzi and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Leonardo Querzoni},
  title        = {Adversarial Attacks Against Binary Similarity Systems},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {161247--161269},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3488204},
  doi          = {10.1109/ACCESS.2024.3488204},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CapozziDLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/AssaianteNDQ24,
  author       = {Cristian Assaiante and
                  Simone Nicchi and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  editor       = {Federico Maggi and
                  Manuel Egele and
                  Mathias Payer and
                  Michele Carminati},
  title        = {Evading Userland {API} Hooking, Again: Novel Attacks and a Principled
                  Defense Method},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 21st International Conference, {DIMVA} 2024, Lausanne, Switzerland,
                  July 17-19, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {150--173},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-64171-8\_8},
  doi          = {10.1007/978-3-031-64171-8\_8},
  timestamp    = {Mon, 19 May 2025 13:59:01 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/AssaianteNDQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BorrelloFDBQG24,
  author       = {Pietro Borrello and
                  Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Davide Balzarotti and
                  Leonardo Querzoni and
                  Cristiano Giuffrida},
  title        = {Predictive Context-sensitive Fuzzing},
  booktitle    = {31st Annual Network and Distributed System Security Symposium, {NDSS}
                  2024, San Diego, California, USA, February 26 - March 1, 2024},
  publisher    = {The Internet Society},
  year         = {2024},
  url          = {https://www.ndss-symposium.org/ndss-paper/predictive-context-sensitive-fuzzing/},
  timestamp    = {Tue, 24 Sep 2024 17:08:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BorrelloFDBQG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2412-04163,
  author       = {Gianluca Capozzi and
                  Tong Tang and
                  Jie Wan and
                  Ziqi Yang and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Lorenzo Cavallaro and
                  Leonardo Querzoni},
  title        = {On the Lack of Robustness of Binary Function Similarity Systems},
  journal      = {CoRR},
  volume       = {abs/2412.04163},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2412.04163},
  doi          = {10.48550/ARXIV.2412.04163},
  eprinttype   = {arXiv},
  eprint       = {2412.04163},
  timestamp    = {Sat, 06 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2412-04163.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DEliaNMMP23,
  author       = {Daniele Cono D'Elia and
                  Simone Nicchi and
                  Matteo Mariani and
                  Matteo Marini and
                  Federico Palmaro},
  title        = {Designing Robust {API} Monitoring Solutions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {392--406},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3133729},
  doi          = {10.1109/TDSC.2021.3133729},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DEliaNMMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/AssaianteDLQ23,
  author       = {Cristian Assaiante and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Leonardo Querzoni},
  editor       = {Tor M. Aamodt and
                  Natalie D. Enright Jerger and
                  Michael M. Swift},
  title        = {Where Did My Variable Go? Poking Holes in Incomplete Debug Information},
  booktitle    = {Proceedings of the 28th {ACM} International Conference on Architectural
                  Support for Programming Languages and Operating Systems, Volume 2,
                  {ASPLOS} 2023, Vancouver, BC, Canada, March 25-29, 2023},
  pages        = {935--947},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3575693.3575720},
  doi          = {10.1145/3575693.3575720},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/AssaianteDLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoschelBDBG23,
  author       = {Jakob Koschel and
                  Pietro Borrello and
                  Daniele Cono D'Elia and
                  Herbert Bos and
                  Cristiano Giuffrida},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Uncontained: Uncovering Container Confusion in the Linux Kernel},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5055--5072},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/koschel},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KoschelBDBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-11143,
  author       = {Gianluca Capozzi and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Leonardo Querzoni},
  title        = {Adversarial Attacks against Binary Similarity Systems},
  journal      = {CoRR},
  volume       = {abs/2303.11143},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.11143},
  doi          = {10.48550/ARXIV.2303.11143},
  eprinttype   = {arXiv},
  eprint       = {2303.11143},
  timestamp    = {Sat, 06 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-11143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dtrap/DEliaIPQ22,
  author       = {Daniele Cono D'Elia and
                  Lorenzo Invidia and
                  Federico Palmaro and
                  Leonardo Querzoni},
  title        = {Evaluating Dynamic Binary Instrumentation Systems for Conspicuous
                  Features and Artifacts},
  journal      = {{DTRAP}},
  volume       = {3},
  number       = {2},
  pages        = {10:1--10:13},
  year         = {2022},
  url          = {https://doi.org/10.1145/3478520},
  doi          = {10.1145/3478520},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dtrap/DEliaIPQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/PriamoDQ22,
  author       = {Giacomo Priamo and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  title        = {Principled Composition of Function Variants for Dynamic Software Diversity
                  and Program Protection},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {183:1--183:5},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3559553},
  doi          = {10.1145/3551349.3559553},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/PriamoDQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-09568,
  author       = {Cristian Assaiante and
                  Daniele Cono D'Elia and
                  Giuseppe Antonio Di Luna and
                  Leonardo Querzoni},
  title        = {Where Did My Variable Go? Poking Holes in Incomplete Debug Information},
  journal      = {CoRR},
  volume       = {abs/2211.09568},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.09568},
  doi          = {10.48550/ARXIV.2211.09568},
  eprinttype   = {arXiv},
  eprint       = {2211.09568},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-09568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BorrelloDQG21,
  author       = {Pietro Borrello and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni and
                  Cristiano Giuffrida},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Constantine: Automatic Side-Channel Resistance Using Efficient Control
                  and Data Flow Linearization},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {715--733},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484583},
  doi          = {10.1145/3460120.3484583},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BorrelloDQG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BorrelloCD21,
  author       = {Pietro Borrello and
                  Emilio Coppa and
                  Daniele Cono D'Elia},
  title        = {Hiding in the Particles: When Return-Oriented Programming Meets Program
                  Obfuscation},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {555--568},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00064},
  doi          = {10.1109/DSN48987.2021.00064},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/BorrelloCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DEliaIQ21,
  author       = {Daniele Cono D'Elia and
                  Lorenzo Invidia and
                  Leonardo Querzoni},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Rope: Covert Multi-process Malware Execution with Return-Oriented
                  Programming},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_10},
  doi          = {10.1007/978-3-030-88418-5\_10},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DEliaIQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FioraldiDB21,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Davide Balzarotti},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {The Use of Likely Invariants as Feedback for Fuzzers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2829--2846},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/fioraldi},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FioraldiDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-10749,
  author       = {Pietro Borrello and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni and
                  Cristiano Giuffrida},
  title        = {Constantine: Automatic Side-Channel Resistance Using Efficient Control
                  and Data Flow Linearization},
  journal      = {CoRR},
  volume       = {abs/2104.10749},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.10749},
  eprinttype   = {arXiv},
  eprint       = {2104.10749},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-10749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DEliaCPC20,
  author       = {Daniele Cono D'Elia and
                  Emilio Coppa and
                  Federico Palmaro and
                  Lorenzo Cavallaro},
  title        = {On the Dissection of Evasive Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2750--2765},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2976559},
  doi          = {10.1109/TIFS.2020.2976559},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DEliaCPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/FioraldiDC20,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Emilio Coppa},
  editor       = {Sarfraz Khurshid and
                  Corina S. Pasareanu},
  title        = {{WEIZZ:} automatic grey-box fuzzing for structured binary formats},
  booktitle    = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, USA, July 18-22, 2020},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395363.3397372},
  doi          = {10.1145/3395363.3397372},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/FioraldiDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/FioraldiDQ20,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Leonardo Querzoni},
  title        = {Fuzzing Binaries for Memory Safety Errors with QASan},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00019},
  doi          = {10.1109/SECDEV45635.2020.00019},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/FioraldiDQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-00323,
  author       = {Simone Nicchi and
                  Matteo Mariani and
                  Matteo Marini and
                  Federico Palmaro and
                  Daniele Cono D'Elia},
  title        = {Designing Robust {API} Monitoring Solutions},
  journal      = {CoRR},
  volume       = {abs/2005.00323},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.00323},
  eprinttype   = {arXiv},
  eprint       = {2005.00323},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-00323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06658,
  author       = {Pietro Borrello and
                  Emilio Coppa and
                  Daniele Cono D'Elia},
  title        = {Hiding in the Particles: When Return-Oriented Programming Meets Program
                  Obfuscation},
  journal      = {CoRR},
  volume       = {abs/2012.06658},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06658},
  eprinttype   = {arXiv},
  eprint       = {2012.06658},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06658.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/BorzacchielloCD19,
  author       = {Luca Borzacchiello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu},
  title        = {Memory models in symbolic execution: key ideas and new thoughts},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {29},
  number       = {8},
  year         = {2019},
  url          = {https://doi.org/10.1002/stvr.1722},
  doi          = {10.1002/STVR.1722},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/stvr/BorzacchielloCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DEliaCNPC19,
  author       = {Daniele Cono D'Elia and
                  Emilio Coppa and
                  Simone Nicchi and
                  Federico Palmaro and
                  Lorenzo Cavallaro},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {SoK: Using Dynamic Binary Instrumentation for Security (And How You
                  May Get Caught Red Handed)},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329819},
  doi          = {10.1145/3321705.3329819},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DEliaCNPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BorzacchielloCD19,
  author       = {Luca Borzacchiello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Reconstructing {C2} Servers for Remote Access Trojans with Symbolic
                  Execution},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {121--140},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_12},
  doi          = {10.1007/978-3-030-20951-3\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/BorzacchielloCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/DEliaCSD19,
  author       = {Daniele Cono D'Elia and
                  Emilio Coppa and
                  Andrea Salvati and
                  Camil Demetrescu},
  title        = {Static Analysis of {ROP} Code},
  booktitle    = {Proceedings of the 12th European Workshop on Systems Security, EuroSec@EuroSys
                  2019, Dresden, Germany, March 25, 2019},
  pages        = {2:1--2:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3301417.3312494},
  doi          = {10.1145/3301417.3312494},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/DEliaCSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BorrelloCDD19,
  author       = {Pietro Borrello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {The {ROP} needle: hiding trigger-based injection vectors via code
                  reuse},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1962--1970},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297472},
  doi          = {10.1145/3297280.3297472},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BorrelloCDD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDDLN19,
  author       = {Marco Angelini and
                  Graziano Blasilli and
                  Luca Borzacchiello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Simone Lenti and
                  Simone Nicchi and
                  Giuseppe Santucci},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {SymNav: Visually Assisting Symbolic Execution},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161524},
  doi          = {10.1109/VIZSEC48167.2019.9161524},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDDLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-00621,
  author       = {Andrea Fioraldi and
                  Daniele Cono D'Elia and
                  Emilio Coppa},
  title        = {{WEIZZ:} Automatic Grey-box Fuzzing for Structured Binary Formats},
  journal      = {CoRR},
  volume       = {abs/1911.00621},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.00621},
  eprinttype   = {arXiv},
  eprint       = {1911.00621},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-00621.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BaldoniCDDF18,
  author       = {Roberto Baldoni and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Irene Finocchi},
  title        = {A Survey of Symbolic Execution Techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {3},
  pages        = {50:1--50:39},
  year         = {2018},
  url          = {https://doi.org/10.1145/3182657},
  doi          = {10.1145/3182657},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/BaldoniCDDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/DEliaD18,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Jeffrey S. Foster and
                  Dan Grossman},
  title        = {On-stack replacement, distilled},
  booktitle    = {Proceedings of the 39th {ACM} {SIGPLAN} Conference on Programming
                  Language Design and Implementation, {PLDI} 2018, Philadelphia, PA,
                  USA, June 18-22, 2018},
  pages        = {166--180},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3192366.3192396},
  doi          = {10.1145/3192366.3192396},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/DEliaD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDFLS18,
  author       = {Marco Angelini and
                  Graziano Blasilli and
                  Pietro Borrello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Serena Ferracci and
                  Simone Lenti and
                  Giuseppe Santucci},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {ROPMate: Visually Assisting the Creation of ROP-based Exploits},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709204},
  doi          = {10.1109/VIZSEC.2018.8709204},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ita17,
  author       = {Daniele Cono D'Elia},
  title        = {New techniques for adaptive program optimization},
  school       = {Sapienza University of Rome, Italy},
  year         = {2017},
  url          = {http://hdl.handle.net/11573/876041},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ita17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BaldoniCDD17,
  author       = {Roberto Baldoni and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {Assisting Malware Analysis with Symbolic Execution: {A} Case Study},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_12},
  doi          = {10.1007/978-3-319-60080-2\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/BaldoniCDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/CoppaDD17,
  author       = {Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Grigore Rosu and
                  Massimiliano Di Penta and
                  Tien N. Nguyen},
  title        = {Rethinking pointer reasoning in symbolic execution},
  booktitle    = {Proceedings of the 32nd {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2017, Urbana, IL, USA, October 30 - November
                  03, 2017},
  pages        = {613--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASE.2017.8115671},
  doi          = {10.1109/ASE.2017.8115671},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/CoppaDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-02512,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu},
  title        = {On-Stack Replacement {\`{a}} la Carte},
  journal      = {CoRR},
  volume       = {abs/1708.02512},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.02512},
  eprinttype   = {arXiv},
  eprint       = {1708.02512},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-02512.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/DEliaDF16,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Irene Finocchi},
  title        = {Mining hot calling contexts in small space},
  journal      = {Softw. Pract. Exp.},
  volume       = {46},
  number       = {8},
  pages        = {1131--1152},
  year         = {2016},
  url          = {https://doi.org/10.1002/spe.2348},
  doi          = {10.1002/SPE.2348},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/DEliaDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/DEliaD16,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Bj{\"{o}}rn Franke and
                  Youfeng Wu and
                  Fabrice Rastello},
  title        = {Flexible on-stack replacement in {LLVM}},
  booktitle    = {Proceedings of the 2016 International Symposium on Code Generation
                  and Optimization, {CGO} 2016, Barcelona, Spain, March 12-18, 2016},
  pages        = {250--260},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2854038.2854061},
  doi          = {10.1145/2854038.2854061},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgo/DEliaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BaldoniCDDF16,
  author       = {Roberto Baldoni and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Irene Finocchi},
  title        = {A Survey of Symbolic Execution Techniques},
  journal      = {CoRR},
  volume       = {abs/1610.00502},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.00502},
  eprinttype   = {arXiv},
  eprint       = {1610.00502},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BaldoniCDDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/DEliaD13,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu},
  editor       = {Antony L. Hosking and
                  Patrick Th. Eugster and
                  Cristina V. Lopes},
  title        = {Ball-Larus path profiling across multiple loop iterations},
  booktitle    = {Proceedings of the 2013 {ACM} {SIGPLAN} International Conference on
                  Object Oriented Programming Systems Languages {\&} Applications,
                  {OOPSLA} 2013, part of {SPLASH} 2013, Indianapolis, IN, USA, October
                  26-31, 2013},
  pages        = {373--390},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2509136.2509521},
  doi          = {10.1145/2509136.2509521},
  timestamp    = {Sun, 06 Oct 2024 21:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/DEliaD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-5197,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Irene Finocchi},
  title        = {Ball-Larus Path Profiling Across Multiple Loop iterations},
  journal      = {CoRR},
  volume       = {abs/1304.5197},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.5197},
  eprinttype   = {arXiv},
  eprint       = {1304.5197},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-5197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/DEliaDF11,
  author       = {Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Irene Finocchi},
  editor       = {Mary W. Hall and
                  David A. Padua},
  title        = {Mining hot calling contexts in small space},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGPLAN} Conference on Programming
                  Language Design and Implementation, {PLDI} 2011, San Jose, CA, USA,
                  June 4-8, 2011},
  pages        = {516--527},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993498.1993559},
  doi          = {10.1145/1993498.1993559},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/DEliaDF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}