The SCEAS System
Navigation Menu

Search the dblp DataBase


Lorenzo Cavallaro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
    Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:127-137 [Conf]
  2. Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
    Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:188-195 [Conf]
  3. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
    Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2007, pp:213-230 [Conf]

  4. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]

  5. PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]

  6. On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP]

  7. Organizing Large Scale Hacking Competitions. [Citation Graph (, )][DBLP]

  8. Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. [Citation Graph (, )][DBLP]

  9. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]

  10. LISABETH: automated content-based signature generator for zero-day polymorphic worms. [Citation Graph (, )][DBLP]

  11. Live and Trustworthy Forensic Analysis of Commodity Production Systems. [Citation Graph (, )][DBLP]

  12. Anomalous Taint Detection. [Citation Graph (, )][DBLP]

  13. An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. [Citation Graph (, )][DBLP]

  14. Diversified Process Replicæ for Defeating Memory Error Exploits. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002