Alessandro Di Federico

According to our database1, Alessandro Di Federico authored at least 14 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Comb for Decompiled C Code.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2018
Compiler techniques for binary analysis and hardening.
PhD thesis, 2018

rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

2017
Venerable Variadic Vulnerabilities Vanquished.
Proceedings of the 26th USENIX Security Symposium, 2017

rev.ng: a unified binary analysis framework to recover CFGs and function boundaries.
Proceedings of the 26th International Conference on Compiler Construction, 2017

2016
A privacy-preserving encrypted OSN with stateless server interaction: The Snake design.
Comput. Secur., 2016

A jump-target identification method for multi-architecture static binary translation.
Proceedings of the 2016 International Conference on Compilers, 2016

2015
OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives.
Concurr. Comput. Pract. Exp., 2015

Tailoring instruction-set extensions for an ultra-low power tightly-coupled cluster of OpenRISC cores.
Proceedings of the 2015 IFIP/IEEE International Conference on Very Large Scale Integration, 2015

How the ELF Ruined Christmas.
Proceedings of the 24th USENIX Security Symposium, 2015

Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Snake: An End-to-End Encrypted Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2012
Lines of malicious code: insights into the malicious software industry.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012


  Loading...