Lorenzo Martignoni

According to our database1, Lorenzo Martignoni authored at least 22 papers between 2006 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A methodology for testing CPU emulators.
ACM Trans. Softw. Eng. Methodol., 2013

2012
Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Path-exploration lifting: hi-fi tests for lo-fi emulators.
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012

2011
Statically-directed dynamic automated test generation.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

2010
Automatic Generation of Remediation Procedures for Malware Infections.
Proceedings of the 19th USENIX Security Symposium, 2010

Live and Trustworthy Forensic Analysis of Commodity Production Systems.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Dynamic and transparent analysis of commodity production systems.
Proceedings of the ASE 2010, 2010

N-version disassembly: differential testing of x86 disassemblers.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Testing system virtual machines.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Conqueror: Tamper-Proof Code Execution on Legacy Systems.
Proceedings of the Detection of Intrusions and Malware, 2010

2009
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Testing CPU emulators.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

A Framework for Behavior-Based Malware Analysis in the Cloud.
Proceedings of the Information Systems Security, 5th International Conference, 2009

How Good Are Malware Detectors at Remediating Infected Systems?.
Proceedings of the Detection of Intrusions and Malware, 2009

Surgically Returning to Randomized lib(c).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A Layered Architecture for Detecting Malicious Behaviors.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

FluXOR: Detecting and Monitoring Fast-Flux Service Networks.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Code Normalization for Self-Mutating Malware.
IEEE Secur. Priv., 2007

A Smart Fuzzer for x86 Executables.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

OmniUnpack: Fast, Generic, and Safe Unpacking of Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Using Code Normalization for Fighting Self-Mutating Malware.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Detecting Self-mutating Malware Using Control-Flow Graph Matching.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006


  Loading...