Pubblicazioni di D'Elia Daniele Cono

2023

Koschel Jakob, Borrello Pietro, D'Elia DANIELE CONO, Bos Herbert, Giuffrida Cristiano
Uncontained: Uncovering Container Confusion in the Linux Kernel. Proceedings of the 32nd USENIX Security Symposium 2023: 5055-5072

Assaiante C., D'Elia D. C., Di Luna G. A., Querzoni L.
Where Did My Variable Go? Poking Holes in Incomplete Debug Information. International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS 2023: 935-947

2022

D’Elia Daniele Cono, Invidia Lorenzo, Palmaro Federico, Querzoni Leonardo
Priamo Giacomo, D'Elia Daniele Cono, Querzoni Leonardo
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering 2022: 1-5

2021

Borrello P., D'Elia D. C., Querzoni L., Giuffrida C.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733

D'Elia Daniele Cono, Nicchi Simone, Mariani Matteo, Marini Matteo, Palmaro Federico
Designing Robust API Monitoring Solutions. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: 1-15

Borrello Pietro, Coppa Emilio, D'Elia Daniele Cono
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568

D'Elia D. C., Invidia L., Querzoni L.
Fioraldi A., D'Elia D. C., Balzarotti D.
The use of likely invariants as feedback for fuzzers. Proceedings of the 30th USENIX Security Symposium 2021: 2829-2846

2020

Fioraldi A., Delia D. C., Querzoni L.
Fuzzing Binaries for Memory Safety Errors with QASan. Proceedings - 2020 IEEE Secure Development, SecDev 2020 2020: 23-30

D'Elia Daniele Cono
D'Elia D. C., Coppa E., Palmaro F., Cavallaro L.
On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765

Fioraldi A., D'Elia D. C., Coppa E.
WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13

2019

D'Elia Daniele Cono
Borzacchiello Luca, Coppa Emilio, D'Elia DANIELE CONO, Demetrescu Camil
Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -

Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140

D'Elia DANIELE CONO, Coppa Emilio, Nicchi Simone, Palmaro Federico, Cavallaro Lorenzo
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27

D'Elia D. C., Coppa E., Salvati A., Demetrescu C.
Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -

Angelini Marco, Blasilli Graziano, Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Lenti Simone, Nicchi Simone, Santucci Giuseppe
SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -

Borrello P., Coppa E., D'Elia D. C., Demetrescu C.
The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970

2018

Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -

D'Elia Daniele Cono, Demetrescu Camil
On-stack replacement, distilled. ACM SIGPLAN NOTICES 2018: 166-180

Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia , Serena Ferracci, Simone Lenti, Giuseppe Santucci
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -

2017

Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188

Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618

2016-06-27

D'Elia DANIELE CONO

2016

D'Elia DANIELE CONO, Demetrescu Camil
Flexible On-Stack Replacement in LLVM. Proceedings of the 14th International Symposium on Code Generation and Optimization, CGO 2016 2016: 250-260

D'Elia DANIELE CONO, Demetrescu Camil
D'ELIA DANIELE CONO, DEMETRESCU Camil, FINOCCHI Irene
Mining Hot Calling Contexts in Small Space. SOFTWARE, PRACTICE AND EXPERIENCE 2016: 1131-1152

2014

D'Elia DANIELE CONO, Demetrescu Camil, Finocchi Irene

2013

D'Elia DANIELE CONO, Demetrescu Camil
Ball-larus path profiling across multiple loop iterations. ACM SIGPLAN NOTICESProceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications 2013: 373-390

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma