Fabio Pagani

Orcid: 0000-0002-4357-9804

According to our database1, Fabio Pagani authored at least 15 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
AutoProfile: Towards Automated Profile Generation for Memory Analysis.
ACM Trans. Priv. Secur., 2022

Regulator: Dynamic Analysis to Detect ReDoS.
Proceedings of the 31st USENIX Security Symposium, 2022

Decomperson: How Humans Decompile and What We Can Learn From It.
Proceedings of the 31st USENIX Security Symposium, 2022

SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
SYMBION: Interleaving Symbolic with Concrete Execution.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Advances in memory forensics. (Progrés dans l'investigation forensique de la mémoire volatile).
PhD thesis, 2019

Introducing the Temporal Dimension to Memory Forensics.
ACM Trans. Priv. Secur., 2019

Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Measuring the Role of Greylisting and Nolisting in Fighting Spam.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2012
When hardware meets software: a bulletproof solution to forensic memory acquisition.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012


  Loading...