Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lines of malicious code: insights into the malicious software industry., , , , and . ACSAC, page 349-358. ACM, (2012)rev.ng: a unified binary analysis framework to recover CFGs and function boundaries., , and . CC, page 131-141. ACM, (2017)rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery., , and . ICCST, page 1-5. IEEE, (2018)rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM.. CS2@HiPEAC, page 20. ACM, (2018)How the ELF Ruined Christmas., , , , and . USENIX Security Symposium, page 643-658. USENIX Association, (2015)A jump-target identification method for multi-architecture static binary translation., and . CASES, page 17:1-17:10. ACM, (2016)Compiler techniques for binary analysis and hardening.. Polytechnic University of Milan, Italy, (2018)Venerable Variadic Vulnerabilities Vanquished., , , , , , , and . USENIX Security Symposium, page 186-198. USENIX Association, (2017)A Comb for Decompiled C Code., , , and . AsiaCCS, page 637-651. ACM, (2020)OpenCL performance portability for general-purpose computation on graphics processor units: an exploration on cryptographic primitives., , , and . Concurr. Comput. Pract. Exp., 27 (14): 3633-3660 (2015)