Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 16 di 16
Titolo Data di pubblicazione Autori Tipo File Abstract
A Smart Fuzzer for x86 Executables 2007 A. LanziL. MartignoniM. MongaR. Paleari Book Part (author) -
On race vulnerabilities in web applications 2008 R. PaleariD.M. BruschiM. Monga + Book Part (author) -
FluXOR : detecting and monitoring fast-flux service networks 2008 E. PasseriniR. PaleariL. MartignoniD.M. Bruschi Book Part (author) -
Testing CPU emulators 2009 L. MartignoniR. PaleariG. Fresi RogliaD.M. Bruschi Book Part (author) -
A hybrid analysis framework for detecting web application vulnerabilities 2009 M. MongaR. PaleariE. Passerini Book Part (author) -
A Framework for Behavior-Based Malware Analysis in the Cloud 2009 L. MartignoniR. PaleariD. Bruschi Book Part (author) -
How good are malware detectors at remediating infected systems? 2009 E. PasseriniR. PaleariL. Martignoni Book Part (author) -
Surgically Returning to Randomized lib(c) 2009 G. Fresi RogliaL. MartignoniR. PaleariD. Bruschi Conference Object -
Dynamic and transparent analysis of commodity production systems 2010 R. PaleariM. Monga + Book Part (author) -
Live and trustworthy forensic analysis of commodity production systems 2010 L. MartignoniFATTORI, ARISTIDER. PaleariL. Cavallaro Book Part (author) -
Conqueror : tamper-proof code execution on legacy systems 2010 L. MartignoniR. PaleariD.M. Bruschi Book Part (author) -
N-version disassembly : differential testing of x86 disassemblers 2010 R. PaleariL. MartignoniG. Fresi RogliaD.M. Bruschi Book Part (author) -
Automatic generation of remediation procedures for malware infections 2010 R. PaleariPASSERINI, EMANUELE + Book Part (author) -
Testing system virtual machines 2010 L. MartignoniR. PaleariG. Fresi RogliaD.M. Bruschi Book Part (author) -
DEALING WITH NEXT-GENERATION MALWARE 2011 R. Paleari Doctoral Thesis -
A methodology for testing CPU emulators 2013 L. MartignoniR. PaleariA. ReinaD. Bruschi + Article (author) -
Mostrati risultati da 1 a 16 di 16
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile