Lorenzo Martignoni
According to our database1,
Lorenzo Martignoni
authored at least 22 papers
between 2006 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012
2011
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the ASE 2010, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
2009
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Using Code Normalization for Fighting Self-Mutating Malware.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006