Follow
Danilo Bruschi
Danilo Bruschi
Professore di Informatica, Università degli Studi di Milano
Verified email at unimi.it
Title
Cited by
Cited by
Year
Secure pebblenets
S Basagni, K Herrin, D Bruschi, E Rosti
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
4412001
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
3382006
S-ARP: a secure address resolution protocol
D Bruschi, A Ornaghi, E Rosti
19th Annual Computer Security Applications Conference, 2003. Proceedings., 66-74, 2003
2792003
Fluxor: Detecting and monitoring fast-flux service networks
E Passerini, R Paleari, L Martignoni, D Bruschi
International conference on detection of intrusions and malware, and …, 2008
2052008
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators.
R Paleari, L Martignoni, GF Roglia, D Bruschi
WOOT 41, 86, 2009
1862009
Surgically returning to randomized lib (c)
GF Roglia, L Martignoni, R Paleari, D Bruschi
2009 Annual Computer Security Applications Conference, 60-69, 2009
1742009
Lower bounds for the broadcast problem in mobile radio networks
D Bruschi, MD Pinto
Distributed Computing 10, 129-135, 1997
1601997
Testing CPU emulators
L Martignoni, R Paleari, GF Roglia, D Bruschi
Proceedings of the eighteenth international symposium on Software testing …, 2009
1552009
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
S Basagni, D Bruschi, I Chlamtac
IEEE/ACM transactions on networking 7 (6), 799-807, 1999
1471999
Voice over IPsec: Analysis and solutions
R Barbieri, D Bruschi, E Rosti
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
1452002
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
1162007
Secure multicast in wireless networks of mobile hosts: protocols and issues
D Bruschi, E Rosti
Mobile Networks and Applications 7 (6), 503-511, 2002
992002
Using code normalization for fighting self-mutating malware
D Bruschi, L Martignoni, M Monga
Proceedings of the International Symposium on Secure Software Engineering, 37-44, 2006
872006
A framework for behavior-based malware analysis in the cloud
L Martignoni, R Paleari, D Bruschi
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
802009
Diversified process replicæ for defeating memory error exploits
D Bruschi, L Cavallaro, A Lanzi
2007 IEEE International Performance, Computing, and Communications …, 2007
792007
Testing system virtual machines
L Martignoni, R Paleari, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on software testing and …, 2010
762010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
662005
When hardware meets software: A bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
602012
N-version disassembly: differential testing of x86 disassemblers
R Paleari, L Martignoni, G Fresi Roglia, D Bruschi
Proceedings of the 19th international symposium on Software testing and …, 2010
452010
A structural overview of NP optimization problems
D Bruschi, D Joseph, P Young
International Symposium on Optimal Algorithms, 205-231, 1989
421989
The system can't perform the operation now. Try again later.
Articles 1–20