Follow
Danilo Bruschi
Danilo Bruschi
Professore di Informatica, Universitą degli Studi di Milano
Verified email at unimi.it
Title
Cited by
Cited by
Year
Secure pebblenets
S Basagni, K Herrin, D Bruschi, E Rosti
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
4482001
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
3562006
S-ARP: a secure address resolution protocol
D Bruschi, A Ornaghi, E Rosti
19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003
2852003
Fluxor: Detecting and monitoring fast-flux service networks
E Passerini, R Paleari, L Martignoni, D Bruschi
International conference on detection of intrusions and malware, and …, 2008
2122008
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
R Paleari, L Martignoni, GF Roglia, D Bruschi
WOOT 41, 86, 2009
1902009
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
2009 Annual Computer Security Applications Conference, 60-69, 2009
1842009
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
1642009
Lower bounds for the broadcast problem in mobile radio networks
D Bruschi, MD Pinto
Distributed Computing 10, 129-135, 1997
1611997
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
S Basagni, D Bruschi, I Chlamtac
IEEE/ACM transactions on networking 7 (6), 799-807, 1999
1471999
Voice over IPsec: Analysis and solutions
R Barbieri, D Bruschi, E Rosti
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
1462002
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
1192007
Secure multicast in wireless networks of mobile hosts: protocols and issues
D Bruschi, E Rosti
Mobile Networks and Applications 7 (6), 503-511, 2002
1002002
Using Code Normalization for Fighting Self-Mutating Malware.
D Bruschi, L Martignoni, M Monga
ISSSE, 2006
872006
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
832009
Diversified process replicę for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
2007 IEEE International Performance, Computing, and Communications …, 2007
812007
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on software testing and …, 2010
802010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
662005
When hardware meets software: A bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
642012
N-version disassembly: differential testing of x86 disassemblers
R Paleari, L Martignoni, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
502010
On race vulnerabilities in web applications
R Paleari, D Marrone, D Bruschi, M Monga
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
422008
The system can't perform the operation now. Try again later.
Articles 1–20