Paolo Milani Comparetti

According to our database1, Paolo Milani Comparetti authored at least 15 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The BORG: Nanoprobing Binaries for Buffer Overreads.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Lobotomy: An Architecture for JIT Spraying Mitigation.
Proceedings of the Ninth International Conference on Availability, 2014

2012
EvilSeed: A Guided Approach to Finding Malicious Web Pages.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Lines of malicious code: insights into the malicious software industry.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Detecting Environment-Sensitive Malware.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Detecting malware's failover C&C strategies with squeeze.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

FORECAST: skimming off the malware cream.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
A DSP multiprocessor architecture for live camera calibration.
Proceedings of the 11th International Workshop on Image Analysis for Multimedia Interactive Services, 2010

Identifying Dormant Functionality in Malware Programs.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

<i>d</i>Anubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
Effective and Efficient Malware Detection at the End Host.
Proceedings of the 18th USENIX Security Symposium, 2009

Prospex: Protocol Specification Extraction.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Scalable, Behavior-Based Malware Clustering.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Automatic Network Protocol Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2008


  Loading...