Danilo Bruschi

Orcid: 0000-0002-5905-5976

According to our database1, Danilo Bruschi authored at least 62 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A framework for assessing AI ethics with applications to cybersecurity.
AI Ethics, February, 2023

2022
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks.
IEEE Trans. Dependable Secur. Comput., 2022

JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

2021
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

2019
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

2014
Improving Mac OS X security through gray box fuzzing technique.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
A methodology for testing CPU emulators.
ACM Trans. Softw. Eng. Methodol., 2013

2012
Peering into the Muddy Waters of Pastebin.
ERCIM News, 2012

When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
N-version disassembly: differential testing of x86 disassemblers.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Testing system virtual machines.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Conqueror: Tamper-Proof Code Execution on Legacy Systems.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Testing CPU emulators.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

A Framework for Behavior-Based Malware Analysis in the Cloud.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Surgically Returning to Randomized lib(c).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
FluXOR: Detecting and Monitoring Fast-Flux Service Networks.
Proceedings of the Detection of Intrusions and Malware, 2008

On Race Vulnerabilities in Web Applications.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Code Normalization for Self-Mutating Malware.
IEEE Secur. Priv., 2007

Diversified Process Replicæ for Defeating Memory Error Exploits.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks.
Proceedings of the Detection of Intrusions and Malware, 2007

2006
String distances and intrusion detection: Bridging the gap between formal languages and computer security.
RAIRO Theor. Informatics Appl., 2006

Using Code Normalization for Fighting Self-Mutating Malware.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Introduction to software engineering for secure systems: SESS06 - secure by design.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

Detecting Self-mutating Malware Using Control-Flow Graph Matching.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Software engineering for secure systems.
ACM SIGSOFT Softw. Eng. Notes, 2005

A Protocol for Anonymous and Accurate E-Polling.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

Replay Attack in TCG Specification and Solution.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.
Proceedings of the Communications and Multimedia Security, 2004

2003
E-vote and Pki's: a Need, a Bliss or a Curse?
Proceedings of the Secure Electronic Voting, 2003

A quantitative study of Public Key Infrastructures.
Comput. Secur., 2003

S-ARP: a Secure Address Resolution Protocol.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

How to unwittingly sign non-repudiable documents with Java applications.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues.
Mob. Networks Appl., 2002

Internet Voting: Do people accept it? Do they trust it?
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Voice over IPsec: Analysis and Solutions.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
AngeL: a tool to disarm computer systems.
Proceedings of the New Security Paradigms Workshop 2001, 2001

Secure pebblenets.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

2000
A logarithmic lower bound for time-spread multiple-access (TSMA) protocols.
Wirel. Networks, 2000

Disarming offense to facilitate defense.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
A mobility-transparent deterministic broadcast mechanism for <i>ad hoc</i> networks.
IEEE/ACM Trans. Netw., 1999

Adding Availability to Log Services of Untrusted Machines.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
A Tool for Pro-active Defense Against the Buffer Overrun Attack.
Proceedings of the Computer Security, 1998

1997
On the Difficulty of Finding Walks of Length <i>k</i>.
RAIRO Theor. Informatics Appl., 1997

Lower Bounds for the Broadcast Problem in Mobile Radio Networks.
Distributed Comput., 1997

1995
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles.
Algorithmica, 1995

1994
On the Existence of Minimum Asynchronous Automata and on the Equivalence Problem for Unambiguous Regular Trace Languages
Inf. Comput., February, 1994

1993
The Complexity of Computing Maximal Word Functions.
Comput. Complex., 1993

A user-friendly environment for parallel programming.
Proceedings of the 1993 Euromicro Workshop on Parallel and Distributed Processing, 1993

1992
Strong Separations of the Polynomial Hierarchy with Oracles: Constructive Separations by Immune and Simple Sets.
Theor. Comput. Sci., 1992

1991
Ranking and Formal Power Series.
Theor. Comput. Sci., 1991

The Complexity of Computing Maximal Word Functions.
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991

1990
Strong Separations for the Boolean Hierarchy over RP.
Int. J. Found. Comput. Sci., 1990

1989
A Structural Overview of NP Optimization Problems.
Proceedings of the Optimal Algorithms, International Symposium, Varna, Bulgaria, May 29, 1989

Generalized Boolean Hierarchies and Boolean Hierarchies Over RP (Conference Abstract).
Proceedings of the Fundamentals of Computation Theory, 1989

1988
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages.
Proceedings of the STACS 88, 1988


  Loading...