Querzoni, Leonardo
176  Ergebnisse:
Personensuche X
?
2

Where Did My Variable Go? Poking Holes in Incomplete Debug ..:

, In: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2,
 
?
5

SoK: Cybersecurity Regulations, Standards and Guidelines fo..:

, In: 2023 IEEE International Conference on Intelligence and Security Informatics (ISI),
 
?
6

Evaluating Dynamic Binary Instrumentation Systems for Consp..:

D'Elia, Daniele Cono ; Invidia, Lorenzo ; Palmaro, Federico.
Digital Threats: Research and Practice (DTRAP).  3 (2022)  2 - p. 1-13 , 2022
 
?
8

Function Representations for Binary Similarity:

Massarelli, Luca ; Di Luna, Giuseppe Antonio ; Petroni, Fabio..
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  4 - p. 2259-2273 , 2022
 
?
9

Principled Composition of Function Variants for Dynamic Sof..:

, In: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering,
 
?
11

Special issue on Algorithmic Theory of Dynamic Networks and..:

Bonomi, Silvia ; Di Luna, Giuseppe A. ; Michail, Othon.
Journal of Computer and System Sciences.  123 (2022)  - p. 157-158 , 2022
 
?
12

Klink: Progress-Aware Scheduling for Streaming Data Systems:

, In: Proceedings of the 2021 International Conference on Management of Data,
 
?
13

Who's debugging the debuggers? exposing debug information b..:

, In: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems,
 
?
14

Constantine: Automatic Side-Channel Resistance Using Effici..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
 
?
15

Rope: Covert Multi-process Malware Execution with Return-Or..:

, In: Computer Security – ESORICS 2021; Lecture Notes in Computer Science,
 
1-15