Sfoglia per Autore
Completeness Refinement in Abstract Symbolic Trajectory Evaluation
2004-01-01 DALLA PREDA, Mila
Semantic-based code obfuscation by abstract interpretation
2005-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto
Control code obfuscation by abstract interpretation
2005-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto
Hunting obfuscated malware by abstract interpretation
2006-01-01 DALLA PREDA, Mila
Opaque Predicate Detection by Abstract Interpretation
2006-01-01 DALLA PREDA, Mila; Matias, Madou; Koen De, Bosschere; Giacobazzi, Roberto
Code obfuscation and malware detection by abstract interpretation
2007-01-01 DALLA PREDA, Mila
A Semantics-Based Approach to Malware Detection
2007-01-01 DALLA PREDA, Mila; M., Christodorescu; S., Jha; S., Debray
Barrier Slicing for Remote Software Trusting
2007-01-01 Ceccato, M.; DALLA PREDA, Mila; Nagra, J.; Collberg, C.; Tonella, P.
A Semantics-Based Approach to Malware Detection
2008-01-01 DALLA PREDA, Mila; M., Christodorescu; S., Jha; S., Debray
Hiding Software Watermarks in Loop Structures.
2008-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto; Visentini, Enrico
Semantic-based Code Obfuscation by Abstract Interpretation
2009-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto
Remote software protection by orthogonal client replacement
2009-01-01 Ceccato, M.; Tonella, P.; DALLA PREDA, Mila; Majumdar, A.
Trading-off security and performance in barrier slicing for remote software entrusting
2009-01-01 Ceccato, M.; DALLA PREDA, Mila; Nagra, J.; Collberg, C. S.; Tonella, P.
Modelling Metamorphism by Abstract Interpretation
2010-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto; Debray, S.; Coogan, K.; Townsend, G.
Hunting Distributed Malware with the k-Calculus
2011-01-01 Dalla Preda, Mila; Di Giusto, Cinzia
Graceful Interruption of Request-Response Service Interactions
2011-01-01 DALLA PREDA, Mila; Gabbrielli, M.; Lanese, I.; Mauro, J.; Zavattaro, G.
The Grand Challenge in Metamorphic Analysis
2012-01-01 DALLA PREDA, Mila
Twisting Additivity in Program Obfuscation
2012-01-01 DALLA PREDA, Mila; Feng, W.; Giacobazzi, Roberto; Greechie, R.; Lakhotia, A.
Interface-Based Service Composition with Aggregation
2012-01-01 DALLA PREDA, Mila; Gabbrielli, M.; Guidi, C.; Mauro, J.; Montesi, F.
Service integration via target-transparent mediation
2012-01-01 DALLA PREDA, Mila; Gabbrielli, Maurizio; Guidi, Claudio; Mauro, Jacopo; Montesi, Fabrizio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Completeness Refinement in Abstract Symbolic Trajectory Evaluation | 1-gen-2004 | DALLA PREDA, Mila | |
Semantic-based code obfuscation by abstract interpretation | 1-gen-2005 | DALLA PREDA, Mila; Giacobazzi, Roberto | |
Control code obfuscation by abstract interpretation | 1-gen-2005 | DALLA PREDA, Mila; Giacobazzi, Roberto | |
Hunting obfuscated malware by abstract interpretation | 1-gen-2006 | DALLA PREDA, Mila | |
Opaque Predicate Detection by Abstract Interpretation | 1-gen-2006 | DALLA PREDA, Mila; Matias, Madou; Koen De, Bosschere; Giacobazzi, Roberto | |
Code obfuscation and malware detection by abstract interpretation | 1-gen-2007 | DALLA PREDA, Mila | |
A Semantics-Based Approach to Malware Detection | 1-gen-2007 | DALLA PREDA, Mila; M., Christodorescu; S., Jha; S., Debray | |
Barrier Slicing for Remote Software Trusting | 1-gen-2007 | Ceccato, M.; DALLA PREDA, Mila; Nagra, J.; Collberg, C.; Tonella, P. | |
A Semantics-Based Approach to Malware Detection | 1-gen-2008 | DALLA PREDA, Mila; M., Christodorescu; S., Jha; S., Debray | |
Hiding Software Watermarks in Loop Structures. | 1-gen-2008 | DALLA PREDA, Mila; Giacobazzi, Roberto; Visentini, Enrico | |
Semantic-based Code Obfuscation by Abstract Interpretation | 1-gen-2009 | DALLA PREDA, Mila; Giacobazzi, Roberto | |
Remote software protection by orthogonal client replacement | 1-gen-2009 | Ceccato, M.; Tonella, P.; DALLA PREDA, Mila; Majumdar, A. | |
Trading-off security and performance in barrier slicing for remote software entrusting | 1-gen-2009 | Ceccato, M.; DALLA PREDA, Mila; Nagra, J.; Collberg, C. S.; Tonella, P. | |
Modelling Metamorphism by Abstract Interpretation | 1-gen-2010 | DALLA PREDA, Mila; Giacobazzi, Roberto; Debray, S.; Coogan, K.; Townsend, G. | |
Hunting Distributed Malware with the k-Calculus | 1-gen-2011 | Dalla Preda, Mila; Di Giusto, Cinzia | |
Graceful Interruption of Request-Response Service Interactions | 1-gen-2011 | DALLA PREDA, Mila; Gabbrielli, M.; Lanese, I.; Mauro, J.; Zavattaro, G. | |
The Grand Challenge in Metamorphic Analysis | 1-gen-2012 | DALLA PREDA, Mila | |
Twisting Additivity in Program Obfuscation | 1-gen-2012 | DALLA PREDA, Mila; Feng, W.; Giacobazzi, Roberto; Greechie, R.; Lakhotia, A. | |
Interface-Based Service Composition with Aggregation | 1-gen-2012 | DALLA PREDA, Mila; Gabbrielli, M.; Guidi, C.; Mauro, J.; Montesi, F. | |
Service integration via target-transparent mediation | 1-gen-2012 | DALLA PREDA, Mila; Gabbrielli, Maurizio; Guidi, Claudio; Mauro, Jacopo; Montesi, Fabrizio |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile