Daniele Cono D'Elia

Orcid: 0000-0003-4358-976X

According to our database1, Daniele Cono D'Elia authored at least 32 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial Attacks Against Binary Similarity Systems.
IEEE Access, 2024

Predictive Context-sensitive Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Designing Robust API Monitoring Solutions.
IEEE Trans. Dependable Secur. Comput., 2023

Uncontained: Uncovering Container Confusion in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023

Where Did My Variable Go? Poking Holes in Incomplete Debug Information.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts.
DTRAP, 2022

Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
The Use of Likely Invariants as Feedback for Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

Rope: Covert Multi-process Malware Execution with Return-Oriented Programming.
Proceedings of the Computer Security - ESORICS 2021, 2021

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
On the Dissection of Evasive Malware.
IEEE Trans. Inf. Forensics Secur., 2020

Fuzzing Binaries for Memory Safety Errors with QASan.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

WEIZZ: automatic grey-box fuzzing for structured binary formats.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

2019
Memory models in symbolic execution: key ideas and new thoughts.
Softw. Test. Verification Reliab., 2019

SymNav: Visually Assisting Symbolic Execution.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

The ROP needle: hiding trigger-based injection vectors via code reuse.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Static Analysis of ROP Code.
Proceedings of the 12th European Workshop on Systems Security, 2019

Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
A Survey of Symbolic Execution Techniques.
ACM Comput. Surv., 2018

ROPMate: Visually Assisting the Creation of ROP-based Exploits.
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018

On-stack replacement, distilled.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

2017
New techniques for adaptive program optimization.
PhD thesis, 2017

On-Stack Replacement à la Carte.
CoRR, 2017

Rethinking pointer reasoning in symbolic execution.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Assisting Malware Analysis with Symbolic Execution: A Case Study.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Mining hot calling contexts in small space.
Softw. Pract. Exp., 2016

Flexible on-stack replacement in LLVM.
Proceedings of the 2016 International Symposium on Code Generation and Optimization, 2016

2013
Ball-Larus Path Profiling Across Multiple Loop iterations
CoRR, 2013

Ball-Larus path profiling across multiple loop iterations.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013


  Loading...