Roberto Paleari

According to our database1, Roberto Paleari authored at least 16 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A methodology for testing CPU emulators.
ACM Trans. Softw. Eng. Methodol., 2013

2010
Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

Live and Trustworthy Forensic Analysis of Commodity Production Systems.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Dynamic and transparent analysis of commodity production systems.
Proceedings of the ASE 2010, 2010

N-version disassembly: differential testing of x86 disassemblers.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Testing system virtual machines.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Conqueror: Tamper-Proof Code Execution on Legacy Systems.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Testing CPU emulators.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

A hybrid analysis framework for detecting web application vulnerabilities.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

A Framework for Behavior-Based Malware Analysis in the Cloud.
Proceedings of the Information Systems Security, 5th International Conference, 2009

How Good Are Malware Detectors at Remediating Infected Systems?.
Proceedings of the Detection of Intrusions and Malware, 2009

Surgically Returning to Randomized lib(c).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
FluXOR: Detecting and Monitoring Fast-Flux Service Networks.
Proceedings of the Detection of Intrusions and Malware, 2008

On Race Vulnerabilities in Web Applications.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
A Smart Fuzzer for x86 Executables.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007


  Loading...