|
Search the dblp DataBase
Lorenzo Cavallaro:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:127-137 [Conf]
- Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:188-195 [Conf]
- Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:213-230 [Conf]
Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]
PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]
On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP]
Organizing Large Scale Hacking Competitions. [Citation Graph (, )][DBLP]
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. [Citation Graph (, )][DBLP]
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]
LISABETH: automated content-based signature generator for zero-day polymorphic worms. [Citation Graph (, )][DBLP]
Live and Trustworthy Forensic Analysis of Commodity Production Systems. [Citation Graph (, )][DBLP]
Anomalous Taint Detection. [Citation Graph (, )][DBLP]
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. [Citation Graph (, )][DBLP]
Diversified Process Replicæ for Defeating Memory Error Exploits. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|