Secure pebblenets S Basagni, K Herrin, D Bruschi, E Rosti Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001 | 447 | 2001 |
Detecting self-mutating malware using control-flow graph matching D Bruschi, L Martignoni, M Monga Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006 | 351 | 2006 |
S-ARP: a secure address resolution protocol D Bruschi, A Ornaghi, E Rosti 19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003 | 285 | 2003 |
Fluxor: Detecting and monitoring fast-flux service networks E Passerini, R Paleari, L Martignoni, D Bruschi International conference on detection of intrusions and malware, and …, 2008 | 212 | 2008 |
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. R Paleari, L Martignoni, GF Roglia, D Bruschi WOOT 41, 86, 2009 | 190 | 2009 |
Surgically returning to randomized lib (c) GF Roglia, L Martignoni, R Paleari, D Bruschi 2009 Annual Computer Security Applications Conference, 60-69, 2009 | 180 | 2009 |
Testing CPU emulators L Martignoni, R Paleari, GF Roglia, D Bruschi Proceedings of the eighteenth international symposium on Software testing …, 2009 | 162 | 2009 |
Lower bounds for the broadcast problem in mobile radio networks D Bruschi, MD Pinto Distributed Computing 10, 129-135, 1997 | 160 | 1997 |
Voice over IPsec: Analysis and solutions R Barbieri, D Bruschi, E Rosti 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 146 | 2002 |
A mobility-transparent deterministic broadcast mechanism for ad hoc networks S Basagni, D Bruschi, I Chlamtac IEEE/ACM transactions on networking 7 (6), 799-807, 1999 | 146 | 1999 |
Code normalization for self-mutating malware D Bruschi, L Martignoni, M Monga IEEE Security & Privacy 5 (2), 46-54, 2007 | 116 | 2007 |
Secure multicast in wireless networks of mobile hosts: protocols and issues D Bruschi, E Rosti Mobile Networks and Applications 7 (6), 503-511, 2002 | 100 | 2002 |
Using Code Normalization for Fighting Self-Mutating Malware. D Bruschi, L Martignoni, M Monga ISSSE, 2006 | 87 | 2006 |
A framework for behavior-based malware analysis in the cloud L Martignoni, R Paleari, D Bruschi Information Systems Security: 5th International Conference, ICISS 2009 …, 2009 | 81 | 2009 |
Diversified process replicæ for defeating memory error exploits D Bruschi, L Cavallaro, A Lanzi 2007 IEEE International Performance, Computing, and Communications …, 2007 | 81 | 2007 |
Testing system virtual machines L Martignoni, R Paleari, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on software testing and …, 2010 | 78 | 2010 |
Replay attack in TCG specification and solution D Bruschi, L Cavallaro, A Lanzi, M Monga 21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005 | 66 | 2005 |
When hardware meets software: A bulletproof solution to forensic memory acquisition A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi Proceedings of the 28th annual computer security applications conference, 79-88, 2012 | 63 | 2012 |
N-version disassembly: differential testing of x86 disassemblers R Paleari, L Martignoni, G Fresi Roglia, D Bruschi Proceedings of the 19th international symposium on Software testing and …, 2010 | 48 | 2010 |
A structural overview of NP optimization problems D Bruschi, D Joseph, P Young International Symposium on Optimal Algorithms, 205-231, 1989 | 42 | 1989 |