Mila Dalla Preda

Orcid: 0000-0003-2761-4347

Affiliations:
  • University of Verona, Italy


According to our database1, Mila Dalla Preda authored at least 64 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Light sensor based covert channels on mobile devices.
Inf. Sci., 2025

2024
Monotonicity and the Precision of Program Analysis.
Proc. ACM Program. Lang., January, 2024

Exploiting number theory for dynamic software watermarking.
J. Comput. Virol. Hacking Tech., 2024

Editorial: Special issue on software protection and attacks.
J. Inf. Secur. Appl., 2024

Obfuscation strategies for industrial control systems.
Int. J. Crit. Infrastructure Prot., 2024

Next Generation Vulnerability Detection with LLMs.
ERCIM News, 2024

EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112).
Dagstuhl Reports, 2024

2023
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode.
J. Syst. Softw., June, 2023

Dataset Characteristics for Reliable Code Authorship Attribution.
IEEE Trans. Dependable Secur. Comput., 2023

A Formal Framework to Measure the Incompleteness of Abstract Interpretations.
Proceedings of the Static Analysis - 30th International Symposium, 2023

Exploring NFT Validation through Digital Watermarking.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Towards Obfuscation of Programmable Logic Controllers.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Partial (In)Completeness in abstract interpretation: limiting the imprecision in program analysis.
Proc. ACM Program. Lang., 2022

On the Properties of Partial Completeness in Abstract Interpretation.
Proceedings of the 23rd Italian Conference on Theoretical Computer Science, 2022

2021
Github Dataset for Authorship Attribution.
Dataset, October, 2021

Data augmentation and transfer learning to classify malware images in a deep learning context.
J. Comput. Virol. Hacking Tech., 2021

Learning metamorphic malware signatures from samples.
J. Comput. Virol. Hacking Tech., 2021

EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode.
Proceedings of the 29th IEEE/ACM International Conference on Program Comprehension, 2021

2020
Formal Framework for Reasoning About the Precision of Dynamic Analysis.
Proceedings of the Static Analysis - 27th International Symposium, 2020

Revealing Similarities in Android Malware by Dissecting their Methods.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Towards a Unifying Framework for Tuning Analysis Precision by Program Transformation.
Proceedings of the Recent Developments in the Design and Implementation of Programming Languages, 2020

2019
Semantics-based software watermarking by abstract interpretation.
Math. Struct. Comput. Sci., 2019

Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331).
Dagstuhl Reports, 2019

Abstract Interpretation of Indexed Grammars.
Proceedings of the Static Analysis - 26th International Symposium, 2019

Adversarial Authorship Attribution in Open-Source Projects.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Characterizing a property-driven obfuscation strategy.
J. Comput. Secur., 2018

A deep learning approach to program similarity.
Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis, 2018

2017
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology.
J. Comput. Virol. Hacking Tech., 2017

Maximal incompleteness as obfuscation potency.
Formal Aspects Comput., 2017

Dynamic Choreographies: Theory And Implementation.
Log. Methods Comput. Sci., 2017

SEA: String Executability Analysis by Abstract Interpretation.
CoRR, 2017

2016
Abstract Similarity Analysis.
Proceedings of the Sixth Workshop on Numerical and Symbolic Abstract Domains, 2016

Software Watermarking: A Semantics-based Approach.
Proceedings of the Sixth Workshop on Numerical and Symbolic Abstract Domains, 2016

Completeness in Approximate Transduction.
Proceedings of the Static Analysis - 23rd International Symposium, 2016

On-chip system call tracing: A feasibility study and open prototype.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Active Android malware analysis: an approach based on stochastic games.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Unveiling metamorphism by abstract interpretation of code properties.
Theor. Comput. Sci., 2015

Developing correct, distributed, adaptive software.
Sci. Comput. Program., 2015

Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Infections as Abstract Symbolic Finite Automata: Formal Model and Applications.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Dynamic Choreographies - Safe Runtime Updates of Distributed Applications.
Proceedings of the Coordination Models and Languages, 2015

2014
Deadlock Freedom by Construction for Distributed Adaptive Applications.
CoRR, 2014

AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications.
Proceedings of the Software Language Engineering - 7th International Conference, 2014

Analyzing program dependencies for malware detection.
Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, 2014

2013
Fast location of similar code fragments using semantic 'juice'.
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013

A Formal Framework for Property-Driven Obfuscation Strategies.
Proceedings of the Fundamentals of Computation Theory - 19th International Symposium, 2013

2012
Service integration via target-transparent mediation.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

Twisting Additivity in Program Obfuscation.
Proceedings of the Information Systems, Technology and Management, 2012

The Grand Challenge in Metamorphic Analysis.
Proceedings of the Information Systems, Technology and Management, 2012

Interface-Based Service Composition with Aggregation.
Proceedings of the Service-Oriented and Cloud Computing - First European Conference, 2012

2011
Graceful Interruption of Request-Response Service Interactions.
Proceedings of the Service-Oriented Computing - 9th International Conference, 2011

Hunting Distributed Malware with the κ-Calculus.
Proceedings of the Fundamentals of Computation Theory - 18th International Symposium, 2011

2010
Modelling Metamorphism by Abstract Interpretation.
Proceedings of the Static Analysis - 17th International Symposium, 2010

2009
Semantics-based code obfuscation by abstract interpretation.
J. Comput. Secur., 2009

Trading-off security and performance in barrier slicing for remote software entrusting.
Autom. Softw. Eng., 2009

Remote software protection by orthogonal client replacement.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
A semantics-based approach to malware detection.
ACM Trans. Program. Lang. Syst., 2008

Hiding Software Watermarks in Loop Structures.
Proceedings of the Static Analysis, 15th International Symposium, 2008

2007
Code obfuscation and malware detection by abstract interpretation.
PhD thesis, 2007

Barrier Slicing for Remote Software Trusting.
Proceedings of the Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30, 2007

2006
Opaque Predicates Detection by Abstract Interpretation.
Proceedings of the Algebraic Methodology and Software Technology, 2006

2005
Control Code Obfuscation by Abstract Interpretation.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Semantic-Based Code Obfuscation by Abstract Interpretation.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

2004
Completeness Refinement in Abstract Symbolic Trajectory Evaluation.
Proceedings of the Static Analysis, 11th International Symposium, 2004


  Loading...