SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed) DC D'Elia, E Coppa, S Nicchi, F Palmaro, L Cavallaro Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 72 | 2019 |
On the dissection of evasive malware DC D’Elia, E Coppa, F Palmaro, L Cavallaro IEEE Transactions on Information Forensics and Security 15, 2750-2765, 2020 | 63 | 2020 |
Designing robust API monitoring solutions DC D’Elia, S Nicchi, M Mariani, M Marini, F Palmaro IEEE Transactions on Dependable and Secure Computing 20 (1), 392-406, 2021 | 16* | 2021 |
Evaluating dynamic binary instrumentation systems for conspicuous features and artifacts DC D’Elia, L Invidia, F Palmaro, L Querzoni Digital Threats: Research and Practice (DTRAP) 3 (2), 1-13, 2022 | 8 | 2022 |
Detecting phishing e-mails using Text Mining and features analysis L Franchina, S Ferracci, F Palmaro CEUR WORKSHOP PROCEEDINGS 2940, 106-119, 2021 | 4 | 2021 |
Beware of Unknown Areas to Notify Adversaries: Detecting Dynamic Binary Instrumentation Runtimes with Low-Level Memory Scanning F Palmaro, L Franchina Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2021 | 2 | 2021 |
Static Analysis of PE files Using Neural Network Techniques for a Pocket Tool S Ferracci, F Palmaro, L Iocchi, D Nardi, L Franchina 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 1 | 2021 |
Hardware transactional memory as anti-analysis technique for software protectors F Palmaro, L Franchina Advances in Information and Communication: Proceedings of the 2020 Future of …, 2020 | 1 | 2020 |
Techniques Implemented in Software Protectors: A Journey with DBI Through What Protectors Use to Detect Bad Guys F Palmaro, L Franchina Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3, 722-737, 2021 | | 2021 |