Daniele Cono D'Elia

According to our database1, Daniele Cono D'Elia authored at least 27 papers between 2013 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


Designing Robust API Monitoring Solutions.
IEEE Trans. Dependable Secur. Comput., 2023

Where Did My Variable Go? Poking Holes in Incomplete Debug Information.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

The Use of Likely Invariants as Feedback for Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

Rope: Covert Multi-process Malware Execution with Return-Oriented Programming.
Proceedings of the Computer Security - ESORICS 2021, 2021

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On the Dissection of Evasive Malware.
IEEE Trans. Inf. Forensics Secur., 2020

Fuzzing Binaries for Memory Safety Errors with QASan.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

WEIZZ: automatic grey-box fuzzing for structured binary formats.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Memory models in symbolic execution: key ideas and new thoughts.
Softw. Test. Verification Reliab., 2019

SymNav: Visually Assisting Symbolic Execution.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

The ROP needle: hiding trigger-based injection vectors via code reuse.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Static Analysis of ROP Code.
Proceedings of the 12th European Workshop on Systems Security, 2019

Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

A Survey of Symbolic Execution Techniques.
ACM Comput. Surv., 2018

ROPMate: Visually Assisting the Creation of ROP-based Exploits.
Proceedings of the 15th IEEE Symposium on Visualization for Cyber Security, 2018

On-stack replacement, distilled.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

New techniques for adaptive program optimization.
PhD thesis, 2017

On-Stack Replacement à la Carte.
CoRR, 2017

Rethinking pointer reasoning in symbolic execution.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Assisting Malware Analysis with Symbolic Execution: A Case Study.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Mining hot calling contexts in small space.
Softw. Pract. Exp., 2016

Flexible on-stack replacement in LLVM.
Proceedings of the 2016 International Symposium on Code Generation and Optimization, 2016

Ball-Larus Path Profiling Across Multiple Loop iterations
CoRR, 2013

Ball-Larus path profiling across multiple loop iterations.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013