default search action
Danilo Bruschi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Davide Rusconi, Matteo Zoia, Luca Buccioli, Fabio Pierazzi, Danilo Bruschi, Lorenzo Cavallaro, Flavio Toffalini, Andrea Lanzi:
EmbedWatch: Fat Pointer Solution for Detecting Spatial Memory Errors in Embedded Systems. CPSIOTSEC@CCS 2024: 55-67 - 2023
- [j19]Danilo Bruschi, Nicla Diomede:
A framework for assessing AI ethics with applications to cybersecurity. AI Ethics 3(1): 65-72 (2023) - 2022
- [j18]Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani:
A Formal Verification of ArpON - A Tool for Avoiding Man-in-the-Middle Attacks in Ethernet Networks. IEEE Trans. Dependable Secur. Comput. 19(6): 4082-4098 (2022) - [c43]Luca Buccioli, Stefano Cristalli, Edoardo Vignati, Lorenzo Nava, Daniele Badagliacca, Danilo Bruschi, Long Lu, Andrea Lanzi:
JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language. STM 2022: 136-155 - 2021
- [j17]Fabio Pierazzi, Stefano Cristalli, Danilo Bruschi, Michele Colajanni, Mirco Marchetti, Andrea Lanzi:
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks. IEEE Trans. Inf. Forensics Secur. 16: 740-755 (2021)
2010 – 2019
- 2019
- [c42]Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi:
Detecting (absent) app-to-app authentication on cross-device short-distance channels. ACSAC 2019: 328-338 - [c41]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CODASPY 2019: 315-325 - [i2]Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi:
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. CoRR abs/1903.12505 (2019) - 2018
- [c40]Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi:
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. RAID 2018: 445-464 - 2017
- [c39]Danilo Bruschi, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, Elena Pagani:
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -. IFM 2017: 391-406 - 2014
- [c38]Stefano Bianchi Mazzone, Mattia Pagnozzi, Aristide Fattori, Alessandro Reina, Andrea Lanzi, Danilo Bruschi:
Improving Mac OS X security through gray box fuzzing technique. EUROSEC 2014: 2:1-2:6 - 2013
- [j16]Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi:
A methodology for testing CPU emulators. ACM Trans. Softw. Eng. Methodol. 22(4): 29:1-29:26 (2013) - 2012
- [c37]Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi:
When hardware meets software: a bulletproof solution to forensic memory acquisition. ACSAC 2012: 79-88 - [i1]Srdjan Matic, Aristide Fattori, Danilo Bruschi, Lorenzo Cavallaro:
Peering into the Muddy Waters of Pastebin. ERCIM News 2012(90) (2012) - 2010
- [c36]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Conqueror: Tamper-Proof Code Execution on Legacy Systems. DIMVA 2010: 21-40 - [c35]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing system virtual machines. ISSTA 2010: 171-182 - [c34]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
N-version disassembly: differential testing of x86 disassemblers. ISSTA 2010: 265-274
2000 – 2009
- 2009
- [c33]Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Surgically Returning to Randomized lib(c). ACSAC 2009: 60-69 - [c32]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
A Framework for Behavior-Based Malware Analysis in the Cloud. ICISS 2009: 178-192 - [c31]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing CPU emulators. ISSTA 2009: 261-272 - [c30]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. WOOT 2009: 1-7 - [e2]Ulrich Flegel, Danilo Bruschi:
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings. Lecture Notes in Computer Science 5587, Springer 2009, ISBN 978-3-642-02917-2 [contents] - 2008
- [c29]Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga:
On Race Vulnerabilities in Web Applications. DIMVA 2008: 126-142 - [c28]Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi:
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. DIMVA 2008: 186-206 - 2007
- [j15]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga:
Code Normalization for Self-Mutating Malware. IEEE Secur. Priv. 5(2): 46-54 (2007) - [c27]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. DIMVA 2007: 213-230 - [c26]Danilo Bruschi, Bart De Win, Seok-Won Lee, Mattia Monga:
The 3rd International Workshop on Software Engineering for Secure Systems SESS07 - Dependable and Secure. ICSE Companion 2007: 111-112 - [c25]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. IPCCC 2007: 418-425 - [c24]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Diversified Process Replicæ for Defeating Memory Error Exploits. IPCCC 2007: 434-441 - 2006
- [j14]Danilo Bruschi, Giovanni Pighizzini:
String distances and intrusion detection: Bridging the gap between formal languages and computer security. RAIRO Theor. Informatics Appl. 40(2): 303-313 (2006) - [c23]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga:
Detecting Self-mutating Malware Using Control-Flow Graph Matching. DIMVA 2006: 129-143 - [c22]Danilo Bruschi, Bart De Win, Mattia Monga:
Introduction to software engineering for secure systems: SESS06 - secure by design. SESS@ICSE 2006: 1-2 - [c21]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ICSE 2006: 1007-1008 - [c20]Danilo Bruschi, Lorenzo Martignoni, Mattia Monga:
Using Code Normalization for Fighting Self-Mutating Malware. ISSSE 2006 - [e1]Danilo Bruschi, Bart De Win, Mattia Monga:
Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006. ACM 2006, ISBN 1-59593-411-1 [contents] - 2005
- [j13]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-2 (2005) - [c19]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga:
Replay Attack in TCG Specification and Solution. ACSAC 2005: 127-137 - [c18]Danilo Bruschi, Bart De Win, Mattia Monga:
Software engineering for secure systems. ICSE 2005: 681 - [c17]Danilo Bruschi, Igor Nai Fovino, Andrea Lanzi:
A Protocol for Anonymous and Accurate E-Polling. TCGOV 2005: 112-121 - 2004
- [c16]Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. Communications and Multimedia Security 2004: 159-171 - 2003
- [j12]Danilo Bruschi, A. Curti, Emilia Rosti:
A quantitative study of Public Key Infrastructures. Comput. Secur. 22(1): 56-67 (2003) - [c15]Danilo Bruschi, A. Ornaghi, Emilia Rosti:
S-ARP: a Secure Address Resolution Protocol. ACSAC 2003: 66-74 - [c14]Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti:
How to unwittingly sign non-repudiable documents with Java applications. ACSAC 2003: 192-196 - [p1]Danilo Bruschi, Giusi Poletti, Emilia Rosti:
E-vote and Pki's: a Need, a Bliss or a Curse? Secure Electronic Voting 2003: 195-209 - 2002
- [j11]Danilo Bruschi, Emilia Rosti:
Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. Mob. Networks Appl. 7(6): 503-511 (2002) - [c13]Roberto Barbieri, Danilo Bruschi, Emilia Rosti:
Voice over IPsec: Analysis and Solutions. ACSAC 2002: 261-270 - [c12]Danilo Bruschi, Fiorella de Cindio, D. Ferrazzi, Giusi Poletti, Emilia Rosti:
Internet Voting: Do people accept it? Do they trust it? DEXA Workshops 2002: 437-440 - 2001
- [c11]Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti:
Secure pebblenets. MobiHoc 2001: 156-163 - [c10]Danilo Bruschi, Emilia Rosti:
AngeL: a tool to disarm computer systems. NSPW 2001: 63-69 - 2000
- [j10]Stefano Basagni, Danilo Bruschi:
A logarithmic lower bound for time-spread multiple-access (TSMA) protocols. Wirel. Networks 6(2): 161-163 (2000) - [c9]Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti:
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. ACSAC 2000: 188-195 - [c8]Danilo Bruschi, Emilia Rosti:
Disarming offense to facilitate defense. NSPW 2000: 69-75
1990 – 1999
- 1999
- [j9]Stefano Basagni, Imrich Chlamtac, Danilo Bruschi:
A mobility-transparent deterministic broadcast mechanism for ad hoc networks. IEEE/ACM Trans. Netw. 7(6): 799-807 (1999) - [c7]Arianna Arona, Danilo Bruschi, Emilia Rosti:
Adding Availability to Log Services of Untrusted Machines. ACSAC 1999: 199-206 - 1998
- [c6]Danilo Bruschi, Emilia Rosti, R. Banfi:
A Tool for Pro-active Defense Against the Buffer Overrun Attack. ESORICS 1998: 17-31 - 1997
- [j8]Danilo Bruschi, Massimiliano Del Pinto:
Lower Bounds for the Broadcast Problem in Mobile Radio Networks. Distributed Comput. 10(3): 129-135 (1997) - [j7]Stefano Basagni, Danilo Bruschi, F. Ravasio:
On the Difficulty of Finding Walks of Length k. RAIRO Theor. Informatics Appl. 31(5): 429-435 (1997) - 1995
- [j6]Danilo Bruschi, F. Ravasio:
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles. Algorithmica 13(4): 346-356 (1995) - 1994
- [j5]Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini:
On the Existence of Minimum Asynchronous Automata and on the Equivalence Problem for Unambiguous Regular Trace Languages. Inf. Comput. 108(2): 262-285 (1994) - 1993
- [j4]Eric Allender, Danilo Bruschi, Giovanni Pighizzini:
The Complexity of Computing Maximal Word Functions. Comput. Complex. 3: 368-391 (1993) - [c5]Danilo Bruschi, P. Lenzi, Ennio Pozzetti, S. Gobbo, Giuseppe Serazzi:
A user-friendly environment for parallel programming. PDP 1993: 451-456 - 1992
- [j3]Danilo Bruschi:
Strong Separations of the Polynomial Hierarchy with Oracles: Constructive Separations by Immune and Simple Sets. Theor. Comput. Sci. 102(2): 215-252 (1992) - 1991
- [j2]Alberto Bertoni, Danilo Bruschi, Massimiliano Goldwurm:
Ranking and Formal Power Series. Theor. Comput. Sci. 79(1): 25-35 (1991) - [c4]Danilo Bruschi, Giovanni Pighizzini:
The Complexity of Computing Maximal Word Functions. FCT 1991: 157-167 - 1990
- [j1]Danilo Bruschi, Deborah Joseph, Paul Young:
Strong Separations for the Boolean Hierarchy over RP. Int. J. Found. Comput. Sci. 1(3): 201-218 (1990)
1980 – 1989
- 1989
- [c3]Alberto Bertoni, Danilo Bruschi, Deborah Joseph, Meera Sitharam, Paul Young:
Generalized Boolean Hierarchies and Boolean Hierarchies Over RP (Conference Abstract). FCT 1989: 35-46 - [c2]Danilo Bruschi, Deborah Joseph, Paul Young:
A Structural Overview of NP Optimization Problems. Optimal Algorithms 1989: 205-231 - 1988
- [c1]Danilo Bruschi, Giovanni Pighizzini, Nicoletta Sabadini:
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages. STACS 1988: 334-345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint