Lorenzo De Carli

Orcid: 0000-0003-0432-3686

According to our database1, Lorenzo De Carli authored at least 40 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Minerva: A File-Based Ransomware Detector.
CoRR, 2023

Beyond Typosquatting: An In-depth Look at Package Confusion.
Proceedings of the 32nd USENIX Security Symposium, 2023

(Nothing But) Many Eyes Make All Bugs Shallow.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

Distinguishing AI- and Human-Generated Code: A Case Study.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

Accessibility Evaluation of IoT Android Mobile Companion Apps.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Guided Feature Identification and Removal for Resource-constrained Firmware.
ACM Trans. Softw. Eng. Methodol., 2022

Reliable detection of compressed and encrypted data.
Neural Comput. Appl., 2022

Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques.
Neural Comput. Appl., 2022

Breaking Embedded Software Homogeneity with Protocol Mutations.
Proceedings of the Security and Privacy in Communication Networks, 2022

What the Fork? Finding Hidden Code Clones in npm.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Wolf at the Door: Preventing Install-Time Attacks in npm with Latch.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Detection of Anomalous User Activity for Home IoT Devices.
Proceedings of the 6th International Conference on Internet of Things, 2021

Vision: Stewardship of Smart Devices Security for the Aging Population.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

2020
SpellBound: Defending Against Package Typosquatting.
CoRR, 2020

Enabling Security Analysis of IoT Device-to-Cloud Traffic.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Assessing Adaptive Attacks Against Trained JavaScript Classifiers.
Proceedings of the Security and Privacy in Communication Networks, 2020

Defending Against Package Typosquatting.
Proceedings of the Network and System Security - 14th International Conference, 2020

EnCoD: Distinguishing Compressed and Encrypted File Fragments.
Proceedings of the Network and System Security - 14th International Conference, 2020

Network Security for Home IoT Devices Must Involve the User: A Position Paper.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Security Issues in Language-based Sofware Ecosystems.
CoRR, 2019

2017
Cimplifier: automatically debloating containers.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Kali: Scalable encryption fingerprinting in dynamic malware traces.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Botnet protocol inference in the presence of encrypted traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Towards Least Privilege Containers with Cimplifier.
CoRR, 2016

2014
A Scheduling Framework for Spatial Architectures Across Multiple Constraint-Solving Theories.
ACM Trans. Program. Lang. Syst., 2014

Deep packet inspection with DFA-trees and parametrized language overapproximation.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014

Memory processing units.
Proceedings of the 2014 IEEE Hot Chips 26 Symposium (HCS), 2014

Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Constraint centric scheduling guide.
SIGARCH Comput. Archit. News, 2013

A general constraint-centric scheduling framework for spatial architectures.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

SWSL: SoftWare Synthesis for network Lookup.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
LEAP: latency- energy- and area-optimized lookup pipeline.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
Deja vu: fingerprinting network problems.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Experiences in Co-designing a Packet Classification Algorithm and a Flexible Hardware Platform.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011

2010
Design and implementation of the PLUG architecture for programmable and efficient network lookups.
Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques, 2010

2009
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Increasing performances of TCP data transfers through multiple parallel connections.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009


  Loading...