Pubblicazioni di D'Elia Daniele Cono
2025
        De Murtas  Andrea,  D'Elia  DANIELE CONO,  DI LUNA  GIUSEPPE ANTONIO,  Felber  Pascal,  Querzoni  Leonardo,  Schiavoni  Valerio  
  
          ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines. The 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2025: -  
          Capozzi  Gianluca,  Tang  Tong,  Wan  Jie,  Yang  Ziqi,  D'Elia  DANIELE CONO,  DI LUNA  GIUSEPPE ANTONIO,  Cavallaro  Lorenzo,  Querzoni  Leonardo  
  
          On the Lack of Robustness of Binary Function Similarity Systems. 10th IEEE European Symposium on Security and Privacy 2025: -  
          Marini  Matteo,  D'Elia  DANIELE CONO,  Payer  Mathias,  Querzoni  Leonardo  
  
          QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing. Proceedings of the Network and Distributed System Security (NDSS) Symposium 2025 2025: -  
  2024
        Capozzi  Gianluca,  D'Elia  Daniele Cono,  Luna  Giuseppe Antonio Di,  Querzoni  Leonardo  
  
          Adversarial Attacks against Binary Similarity Systems. IEEE ACCESS 2024: 161247-161269  
          Assaiante  Cristian,  Nicchi  Simone,  D'Elia  Daniele Cono,  Querzoni  Leonardo  
  
          Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2024. Lecture Notes in Computer Science 2024: 150-173  
          Borrello  Pietro,  Fioraldi  Andrea,  D'Elia  DANIELE CONO,  Balzarotti  Davide,  Querzoni  Leonardo,  Giuffrida  Cristiano  
  
          Predictive Context-sensitive Fuzzing. Proceedings of the Network and Distributed System Security (NDSS) Symposium 2024 2024: -  
          Oz  Harun,  D'Elia  Daniele Cono,  Tuncay  Güliz Seray,  Acar  Abbas,  Lazzeretti  Riccardo,  Uluagac  Selcuk  
  
          With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. IEEE SECURITY & PRIVACY 2024: 2-11  
  2023
        Koschel  Jakob,  Borrello  Pietro,  D'Elia  DANIELE CONO,  Bos  Herbert,  Giuffrida  Cristiano  
  
          Uncontained: Uncovering Container Confusion in the Linux Kernel. Proceedings of the 32nd USENIX Security Symposium 2023: 5055-5072  
          Assaiante  C.,  D'Elia  D. C.,  Di Luna  G. A.,  Querzoni  L.  
  
          Where Did My Variable Go? Poking Holes in Incomplete Debug Information. International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS 2023: 935-947  
  2022
        D’Elia  Daniele Cono,  Invidia  Lorenzo,  Palmaro  Federico,  Querzoni  Leonardo  
  
          Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. DIGITAL THREATS 2022: 1-13  
          Priamo  Giacomo,  D'Elia  Daniele Cono,  Querzoni  Leonardo  
  
          Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering 2022: 1-5  
  2021
        Borrello  P.,  D'Elia  D. C.,  Querzoni  L.,  Giuffrida  C.  
  
          Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733  
          D'Elia  Daniele Cono,  Nicchi  Simone,  Mariani  Matteo,  Marini  Matteo,  Palmaro  Federico  
  
          Designing Robust API Monitoring Solutions. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: 1-15  
          Borrello  Pietro,  Coppa  Emilio,  D'Elia  Daniele Cono  
  
          Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568  
          D'Elia  Daniele Cono  
  
            D'Elia  D. C.,  Invidia  L.,  Querzoni  L.  
  
          Rope: Covert Multi-process Malware Execution with Return-Oriented Programming. Computer Security – ESORICS 2021 2021: 197-217  
          Fioraldi  A.,  D'Elia  D. C.,  Balzarotti  D.  
  
          The use of likely invariants as feedback for fuzzers. Proceedings of the 30th USENIX Security Symposium 2021: 2829-2846  
  2020
        Fioraldi  A.,  Delia  D. C.,  Querzoni  L.  
  
          Fuzzing Binaries for Memory Safety Errors with QASan. Proceedings - 2020 IEEE Secure Development, SecDev 2020 2020: 23-30  
          D'Elia  Daniele Cono  
  
          My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection. Black Hat Europe Briefings 2020: -  
          D'Elia  D. C.,  Coppa  E.,  Palmaro  F.,  Cavallaro  L.  
  
          On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765  
          Fioraldi  A.,  D'Elia  D. C.,  Coppa  E.  
  
          WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13  
  2019
        D'Elia  Daniele Cono  
  
          BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection. Black Hat Europe Briefings 2019: -  
          Borzacchiello  Luca,  Coppa  Emilio,  D'Elia  DANIELE CONO,  Demetrescu  Camil  
  
          Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -  
          Borzacchiello  Luca,  Coppa  Emilio,  D'Elia  Daniele Cono,  Demetrescu  Camil  
  
          Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140  
          D'Elia  DANIELE CONO,  Coppa  Emilio,  Nicchi  Simone,  Palmaro  Federico,  Cavallaro  Lorenzo  
  
          SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27  
          D'Elia  D. C.,  Coppa  E.,  Salvati  A.,  Demetrescu  C.  
  
          Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -  
          Angelini  Marco,  Blasilli  Graziano,  Borzacchiello  Luca,  Coppa  Emilio,  D'Elia  Daniele Cono,  Demetrescu  Camil,  Lenti  Simone,  Nicchi  Simone,  Santucci  Giuseppe  
  
          SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -  
          Borrello  P.,  Coppa  E.,  D'Elia  D. C.,  Demetrescu  C.  
  
          The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970  
  2018
        Baldoni  Roberto,  Coppa  Emilio,  D'Elia  Daniele Cono,  Demetrescu  Camil,  Finocchi  Irene  
  
          A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -  
          D'Elia  Daniele Cono,  Demetrescu  Camil  
  
          On-stack replacement, distilled. ACM SIGPLAN NOTICES 2018: 166-180  
          Marco  Angelini,  Graziano  Blasilli,  Pietro  Borrello,  Emilio  Coppa,  Daniele Cono D'Elia  ,  Serena  Ferracci,  Simone  Lenti,  Giuseppe  Santucci  
  
          ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -  
  2017
        Baldoni  Roberto,  Coppa  Emilio,  D’Elia  Daniele Cono,  Demetrescu  Camil  
  
          Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188  
          Coppa  Emilio,  D'Elia  Daniele Cono,  Demetrescu  Camil  
  
          Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618  
  2016-06-27
        D'Elia  DANIELE CONO  
  
          New techniques for adaptive program optimization.  2016-06-27: -  
  2016
        D'Elia  DANIELE CONO,  Demetrescu  Camil  
  
          Flexible On-Stack Replacement in LLVM. Proceedings of the 14th International Symposium on Code Generation and Optimization, CGO 2016 2016: 250-260  
          D'Elia  DANIELE CONO,  Demetrescu  Camil  
  
            D'ELIA  DANIELE CONO,  DEMETRESCU  Camil,  FINOCCHI  Irene  
  
          Mining Hot Calling Contexts in Small Space. SOFTWARE, PRACTICE AND EXPERIENCE 2016: 1131-1152  
  2014
        D'Elia  DANIELE CONO,  Demetrescu  Camil,  Finocchi  Irene  
  
    2013
        D'Elia  DANIELE CONO,  Demetrescu  Camil  
  
          Ball-larus path profiling across multiple loop iterations. ACM SIGPLAN NOTICESProceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications 2013: 373-390