Redini, Nilo
18  results:
Search for persons X
?
1

Shimware: Toward Practical Security Retrofitting for Monoli..:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
Gustafson, Eric ; Grosen, Paul ; Redini, Nilo... - p. 32-45 , 2023
 
?
2

HEAPSTER: Analyzing the Security of Dynamic Allocators for ..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Gritti, Fabio ; Pagani, Fabio ; Grishchenko, Ilya... - p. 1082-1099 , 2022
 
?
3

Diane: Identifying Fuzzing Triggers in Apps to Generate Und..:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
Redini, Nilo ; Continella, Andrea ; Das, Dipanjan... - p. 484-500 , 2021
 
?
4

Conware: Automated Modeling of Hardware Peripherals:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Spensky, Chad ; Machiry, Aravind ; Redini, Nilo... - p. 95-109 , 2021
 
?
5

Karonte: Detecting Insecure Multi-binary Interactions in Em..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Redini, Nilo ; Machiry, Aravind ; Wang, Ruoyu... - p. 1544-1561 , 2020
 
?
6

SPIDER: Enabling Fast Patch Propagation In Related Software..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Machiry, Aravind ; Redini, Nilo ; Camellini, Eric.. - p. 1562-1579 , 2020
 
?
7

BinTrimmer: Towards Static Binary Debloating Through Abstra..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Redini, Nilo ; Wang, Ruoyu ; Machiry, Aravind... - p. 482-501 , 2019
 
?
8

Using Loops For Malware Classification Resilient to Feature..:

, In: Proceedings of the 34th Annual Computer Security Applications Conference,
Machiry, Aravind ; Redini, Nilo ; Gustafson, Eric... - p. 112-123 , 2018
 
?
9

Smartphone-based crowdsourcing for estimating the bottlenec..:

Gregori, Enrico ; Improta, Alessandro ; Lenzini, Luciano...
Journal of Network and Computer Applications.  64 (2016)  - p. 62-75 , 2016
 
?
 
1-15