Sfoglia per Autore
Chasing infections by unveiling program dependencies.
2013-01-01 DALLA PREDA, Mila; Mastroeni, Isabella
Formal Framework for Property-driven Obfuscations
2013-01-01 DALLA PREDA, Mila; Mastroeni, Isabella; Giacobazzi, Roberto
Fast location of similar code fragments using semantic 'juice'
2013-01-01 Arun, Lakhotia; DALLA PREDA, Mila; Giacobazzi, Roberto
Analyzing program dependences for malware detection.
2014-01-01 DALLA PREDA, Mila; Mastroeni, Isabella; Giacobazzi, Roberto
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications.
2014-01-01 DALLA PREDA, Mila; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro; Maurizio, Gabbrielli
Developing correct, distributed, adaptive software
2015-01-01 DALLA PREDA, Mila; Maiurizio, Gabbrielli; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications.
2015-01-01 DALLA PREDA, Mila; Mastroeni, Isabella
Unveiling metamorphism by abstract interpretation of code properties
2015-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto; Saumya K., Debray
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables
2015-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto; Arun, Lakhotia; Mastroeni, Isabella
Dynamic Choreographies Safe Runtime Updates of Distributed Applications.
2015-01-01 DALLA PREDA, Mila; Maurizio, Gabbrielli; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables
2015-01-01 DALLA PREDA, Mila; Giacobazzi, Roberto; Mastroeni, Isabella
A semantics-based approach to software watermarking by abstract interpretation
2016-01-01 DALLA PREDA, Mila; Pasqua, Michele
On-chip system call tracing: A feasibility study and open prototype
2016-01-01 Chengyu Zheng, Null; DALLA PREDA, Mila; Granjal, Jorge; Zanero, Stefano; Maggi, Federico
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology
2016-01-01 DALLA PREDA, Mila; Maggi, Federico
Active Android malware analysis: an approach based on stochastic games
2016-01-01 Sartea, Riccardo; DALLA PREDA, Mila; Farinelli, Alessandro; Giacobazzi, Roberto; Mastroeni, Isabella
Completeness in Approximate Transduction
2016-01-01 Dalla Preda, Mila; Giacobazzi, Roberto; Mastroeni, Isabella
SEA: String Executability Analysis by Abstract Interpretation
2017-01-01 Arceri, Vincenzo; DALLA PREDA, Mila; Giacobazzi, Roberto; Mastroeni, Isabella
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities
2017-01-01 Marastoni, Niccolo'; Continella, Andrea; Quarta, Davide; Zanero, Stefano; DALLA PREDA, Mila
Software Watermarking: A Semantics-based Approach
2017-01-01 DALLA PREDA, Mila; Pasqua, Michele
Maximal incompleteness as obfuscation potency
2017-01-01 Giacobazzi, Roberto; Mastroeni, Isabella; DALLA PREDA, Mila
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Chasing infections by unveiling program dependencies. | 1-gen-2013 | DALLA PREDA, Mila; Mastroeni, Isabella | |
Formal Framework for Property-driven Obfuscations | 1-gen-2013 | DALLA PREDA, Mila; Mastroeni, Isabella; Giacobazzi, Roberto | |
Fast location of similar code fragments using semantic 'juice' | 1-gen-2013 | Arun, Lakhotia; DALLA PREDA, Mila; Giacobazzi, Roberto | |
Analyzing program dependences for malware detection. | 1-gen-2014 | DALLA PREDA, Mila; Mastroeni, Isabella; Giacobazzi, Roberto | |
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications. | 1-gen-2014 | DALLA PREDA, Mila; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro; Maurizio, Gabbrielli | |
Developing correct, distributed, adaptive software | 1-gen-2015 | DALLA PREDA, Mila; Maiurizio, Gabbrielli; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro | |
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications. | 1-gen-2015 | DALLA PREDA, Mila; Mastroeni, Isabella | |
Unveiling metamorphism by abstract interpretation of code properties | 1-gen-2015 | DALLA PREDA, Mila; Giacobazzi, Roberto; Saumya K., Debray | |
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables | 1-gen-2015 | DALLA PREDA, Mila; Giacobazzi, Roberto; Arun, Lakhotia; Mastroeni, Isabella | |
Dynamic Choreographies Safe Runtime Updates of Distributed Applications. | 1-gen-2015 | DALLA PREDA, Mila; Maurizio, Gabbrielli; Saverio, Giallorenzo; Ivan, Lanese; Jacopo, Mauro | |
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables | 1-gen-2015 | DALLA PREDA, Mila; Giacobazzi, Roberto; Mastroeni, Isabella | |
A semantics-based approach to software watermarking by abstract interpretation | 1-gen-2016 | DALLA PREDA, Mila; Pasqua, Michele | |
On-chip system call tracing: A feasibility study and open prototype | 1-gen-2016 | Chengyu Zheng, Null; DALLA PREDA, Mila; Granjal, Jorge; Zanero, Stefano; Maggi, Federico | |
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology | 1-gen-2016 | DALLA PREDA, Mila; Maggi, Federico | |
Active Android malware analysis: an approach based on stochastic games | 1-gen-2016 | Sartea, Riccardo; DALLA PREDA, Mila; Farinelli, Alessandro; Giacobazzi, Roberto; Mastroeni, Isabella | |
Completeness in Approximate Transduction | 1-gen-2016 | Dalla Preda, Mila; Giacobazzi, Roberto; Mastroeni, Isabella | |
SEA: String Executability Analysis by Abstract Interpretation | 1-gen-2017 | Arceri, Vincenzo; DALLA PREDA, Mila; Giacobazzi, Roberto; Mastroeni, Isabella | |
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities | 1-gen-2017 | Marastoni, Niccolo'; Continella, Andrea; Quarta, Davide; Zanero, Stefano; DALLA PREDA, Mila | |
Software Watermarking: A Semantics-based Approach | 1-gen-2017 | DALLA PREDA, Mila; Pasqua, Michele | |
Maximal incompleteness as obfuscation potency | 1-gen-2017 | Giacobazzi, Roberto; Mastroeni, Isabella; DALLA PREDA, Mila |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile