Danilo Bruschi
Orcid: 0000-0002-5905-5976
According to our database1,
Danilo Bruschi
authored at least 62 papers
between 1988 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
AI Ethics, February, 2023
2022
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks.
IEEE Trans. Dependable Secur. Comput., 2022
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
2017
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017
2014
Proceedings of the Seventh European Workshop on System Security, 2014
2013
2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
2009
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Detection of Intrusions and Malware, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the Detection of Intrusions and Malware, 2007
2006
String distances and intrusion detection: Bridging the gap between formal languages and computer security.
RAIRO Theor. Informatics Appl., 2006
Using Code Normalization for Fighting Self-Mutating Malware.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
2005
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Communications and Multimedia Security, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Mob. Networks Appl., 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001
2000
Wirel. Networks, 2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
IEEE/ACM Trans. Netw., 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of the Computer Security, 1998
1997
RAIRO Theor. Informatics Appl., 1997
Distributed Comput., 1997
1995
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles.
Algorithmica, 1995
1994
On the Existence of Minimum Asynchronous Automata and on the Equivalence Problem for Unambiguous Regular Trace Languages
Inf. Comput., February, 1994
1993
Proceedings of the 1993 Euromicro Workshop on Parallel and Distributed Processing, 1993
1992
Strong Separations of the Polynomial Hierarchy with Oracles: Constructive Separations by Immune and Simple Sets.
Theor. Comput. Sci., 1992
1991
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991
1990
Int. J. Found. Comput. Sci., 1990
1989
Proceedings of the Optimal Algorithms, International Symposium, Varna, Bulgaria, May 29, 1989
Generalized Boolean Hierarchies and Boolean Hierarchies Over RP (Conference Abstract).
Proceedings of the Fundamentals of Computation Theory, 1989
1988
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages.
Proceedings of the STACS 88, 1988