Name
Affiliation
Papers
DANILO BRUSCHI
Univ Milan, Dipartimento Informat & Comunicaz, Milan, Italy
50
Collaborators
Citations 
PageRank 
54
771
70.35
Referers 
Referees 
References 
1472
858
534
Search Limit
1001000
Title
Citations
PageRank
Year
Glyph: Efficient ML-Based Detection of Heap Spraying Attacks00.342021
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images.00.342019
Detecting (absent) app-to-app authentication on cross-device short-distance channels00.342019
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -.00.342017
Improving Mac OS X security through gray box fuzzing technique10.632014
A methodology for testing CPU emulators40.432013
Peering Into The Muddy Waters Of Pastebin20.392012
When hardware meets software: a bulletproof solution to forensic memory acquisition150.582012
Testing system virtual machines160.702010
N-version disassembly: differential testing of x86 disassemblers130.702010
Conqueror: tamper-proof code execution on legacy systems140.842010
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings130.942009
Testing CPU emulators311.672009
A Framework for Behavior-Based Malware Analysis in the Cloud170.852009
FluXOR: Detecting and Monitoring Fast-Flux Service Networks564.352008
On Race Vulnerabilities in Web Applications100.662008
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks80.532007
Code Normalization for Self-Mutating Malware291.482007
Code Normalization for Self-Mutating Malware291.482007
Code Normalization for Self-Mutating Malware291.482007
Code Normalization for Self-Mutating Malware291.482007
The 3rd International Workshop on Software Engineering for Secure Systems SESS07--Dependable and Secure00.342007
Diversified Process Replicae For Defeating Memory Error Exploits301.412007
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks10.352007
Detecting self-mutating malware using control-flow graph matching894.282006
Introduction to software engineering for secure systems: SESS06 -- secure by design00.342006
String distances and intrusion detection: Bridging the gap between formal languages and computer security10.382006
Software engineering for secure systems10.352005
A protocol for anonymous and accurate e-polling40.852005
Replay Attack in TCG Specification and Solution221.282005
Voice over IPsec: Analysis and Solutions433.842002
Secure multicast in wireless networks of mobile hosts: protocols and issues261.602002
AngeL: a tool to disarm computer systems31.752001
A logarithmic lower bound for time-spread multiple-access (TSMA) protocols50.402000
Disarming offense to facilitate defense86.402000
Adding Availability to Log Services of Untrusted Machines30.411999
A mobility-transparent deterministic broadcast mechanism for ad hoc networks617.331999
A Tool for Pro-active Defense Against the Buffer Overrun Attack63.711998
Lower bounds for the broadcast problem in mobile radio networks905.011997
On the Difficulty of Finding Walks of Length k10.371997
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles10.401995
On the existence of minimum asynchronous automata and on the equivalence problem for unambiguous regular trace languages30.431994
A user-friendly environment for parallel programming.40.511993
The complexity of computing maximal word functions130.711993
Strong separations of the polynomial hierarchy with oracles: constructive separations by immune and simple sets70.451992
Ranking and formal power series60.561991
The Complexity of Computing Maximal Word Functions00.341991
Strong Separations for the Boolean Hierarchy over RP90.511990
A Structural Overview of NP Optimization Problems135.001989
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages50.521988