Pubblicazioni di D'Elia Daniele Cono
2024
Borrello Pietro, Fioraldi Andrea, D'Elia DANIELE CONO, Balzarotti Davide, Querzoni Leonardo, Giuffrida Cristiano
Predictive Context-sensitive Fuzzing. Proceedings of the Network and Distributed System Security (NDSS) Symposium 2024 2024: -
2023
Koschel Jakob, Borrello Pietro, D'Elia DANIELE CONO, Bos Herbert, Giuffrida Cristiano
Uncontained: Uncovering Container Confusion in the Linux Kernel. Proceedings of the 32nd USENIX Security Symposium 2023: 5055-5072
Assaiante C., D'Elia D. C., Di Luna G. A., Querzoni L.
Where Did My Variable Go? Poking Holes in Incomplete Debug Information. International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS 2023: 935-947
2022
D’Elia Daniele Cono, Invidia Lorenzo, Palmaro Federico, Querzoni Leonardo
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts. DIGITAL THREATS 2022: 1-13
Priamo Giacomo, D'Elia Daniele Cono, Querzoni Leonardo
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering 2022: 1-5
2021
Borrello P., D'Elia D. C., Querzoni L., Giuffrida C.
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization. Proceedings of the ACM Conference on Computer and Communications Security 2021: 715-733
D'Elia Daniele Cono, Nicchi Simone, Mariani Matteo, Marini Matteo, Palmaro Federico
Designing Robust API Monitoring Solutions. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021: 1-15
Borrello Pietro, Coppa Emilio, D'Elia Daniele Cono
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation. 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021: 555-568
D'Elia Daniele Cono
D'Elia D. C., Invidia L., Querzoni L.
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming. Computer Security – ESORICS 2021 2021: 197-217
Fioraldi A., D'Elia D. C., Balzarotti D.
The use of likely invariants as feedback for fuzzers. Proceedings of the 30th USENIX Security Symposium 2021: 2829-2846
2020
Fioraldi A., Delia D. C., Querzoni L.
Fuzzing Binaries for Memory Safety Errors with QASan. Proceedings - 2020 IEEE Secure Development, SecDev 2020 2020: 23-30
D'Elia Daniele Cono
My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection. Black Hat Europe Briefings 2020: -
D'Elia D. C., Coppa E., Palmaro F., Cavallaro L.
On the Dissection of Evasive Malware. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020: 2750-2765
Fioraldi A., D'Elia D. C., Coppa E.
WEIZZ: Automatic grey-box fuzzing for structured binary formats. ISSTA 2020 - Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis 2020: 1-13
2019
D'Elia Daniele Cono
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection. Black Hat Europe Briefings 2019: -
Borzacchiello Luca, Coppa Emilio, D'Elia DANIELE CONO, Demetrescu Camil
Memory Models in Symbolic Execution: Key Ideas and New Thoughts. SOFTWARE TESTING, VERIFICATION & RELIABILITY 2019: -
Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. Cyber Security Cryptography and Machine Learning 2019: 121-140
D'Elia DANIELE CONO, Coppa Emilio, Nicchi Simone, Palmaro Federico, Cavallaro Lorenzo
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS '19 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019: 15-27
D'Elia D. C., Coppa E., Salvati A., Demetrescu C.
Static analysis of ROP code. EuroSec '19 Proceedings of the 12th European Workshop on Systems Security 2019: -
Angelini Marco, Blasilli Graziano, Borzacchiello Luca, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Lenti Simone, Nicchi Simone, Santucci Giuseppe
SymNav: Visually Assisting Symbolic Execution. Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security (VizSec 2019) 2019: -
Borrello P., Coppa E., D'Elia D. C., Demetrescu C.
The ROP needle: Hiding trigger-based injection vectors via code reuse. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019: 1962-1970
2018
Baldoni Roberto, Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil, Finocchi Irene
A Survey of Symbolic Execution Techniques. ACM COMPUTING SURVEYS 2018: -
D'Elia Daniele Cono, Demetrescu Camil
On-stack replacement, distilled. ACM SIGPLAN NOTICES 2018: 166-180
Marco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia , Serena Ferracci, Simone Lenti, Giuseppe Santucci
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018: -
2017
Baldoni Roberto, Coppa Emilio, D’Elia Daniele Cono, Demetrescu Camil
Assisting malware analysis with symbolic execution: A case study. Cyber Security Cryptographyand Machine Learning 2017: 171-188
Coppa Emilio, D'Elia Daniele Cono, Demetrescu Camil
Rethinking Pointer Reasoning in Symbolic Execution. ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering 2017: 613-618
2016-06-27
D'Elia DANIELE CONO
New techniques for adaptive program optimization. 2016-06-27: -
2016
D'Elia DANIELE CONO, Demetrescu Camil
Flexible On-Stack Replacement in LLVM. Proceedings of the 14th International Symposium on Code Generation and Optimization, CGO 2016 2016: 250-260
D'Elia DANIELE CONO, Demetrescu Camil
D'ELIA DANIELE CONO, DEMETRESCU Camil, FINOCCHI Irene
Mining Hot Calling Contexts in Small Space. SOFTWARE, PRACTICE AND EXPERIENCE 2016: 1131-1152
2014
D'Elia DANIELE CONO, Demetrescu Camil, Finocchi Irene
2013
D'Elia DANIELE CONO, Demetrescu Camil
Ball-larus path profiling across multiple loop iterations. ACM SIGPLAN NOTICESProceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications 2013: 373-390