Suivre
Danilo Bruschi
Danilo Bruschi
Professore di Informatica, Università degli Studi di Milano
Adresse e-mail validée de unimi.it
Titre
Citée par
Citée par
Année
Secure pebblenets
S Basagni, K Herrin, D Bruschi, E Rosti
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
4472001
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
3512006
S-ARP: a secure address resolution protocol
D Bruschi, A Ornaghi, E Rosti
19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003
2852003
Fluxor: Detecting and monitoring fast-flux service networks
E Passerini, R Paleari, L Martignoni, D Bruschi
International conference on detection of intrusions and malware, and …, 2008
2122008
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
R Paleari, L Martignoni, GF Roglia, D Bruschi
WOOT 41, 86, 2009
1902009
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
2009 Annual Computer Security Applications Conference, 60-69, 2009
1802009
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
1622009
Lower bounds for the broadcast problem in mobile radio networks
D Bruschi, MD Pinto
Distributed Computing 10, 129-135, 1997
1601997
Voice over IPsec: Analysis and solutions
R Barbieri, D Bruschi, E Rosti
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
1462002
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
S Basagni, D Bruschi, I Chlamtac
IEEE/ACM transactions on networking 7 (6), 799-807, 1999
1461999
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
1162007
Secure multicast in wireless networks of mobile hosts: protocols and issues
D Bruschi, E Rosti
Mobile Networks and Applications 7 (6), 503-511, 2002
1002002
Using Code Normalization for Fighting Self-Mutating Malware.
D Bruschi, L Martignoni, M Monga
ISSSE, 2006
872006
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
812009
Diversified process replicæ for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
2007 IEEE International Performance, Computing, and Communications …, 2007
812007
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on software testing and …, 2010
782010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
662005
When hardware meets software: A bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
632012
N-version disassembly: differential testing of x86 disassemblers
R Paleari, L Martignoni, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
482010
A structural overview of NP optimization problems
D Bruschi, D Joseph, P Young
International Symposium on Optimal Algorithms, 205-231, 1989
421989
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20