Sfoglia per Autore
Virtualized Security at the Network Edge: A User-centric Approach
2015 Montero, D.; Yannuzzi, M.; Shaw, A.; Jacquin, L.; Pastor, A.; Serral Gracià, R.; Lioy, Antonio; Risso, FULVIO GIOVANNI OTTAVIO; Basile, Cataldo; Sassu, Roberto; Nemirovsky, M.; Ciaccia, Francesco; Georgiades, M.; Charalambides, S.; Kuusijarvi, J.; Bosco, F.
Analysis of application-layer filtering policies with application to HTTP
2015 Basile, Cataldo; Lioy, Antonio
A Formal Model of Network Policy Analysis
2015 Valenza, Fulvio; Spinoso, Serena; Basile, Cataldo; Sisto, Riccardo; Lioy, Antonio
Assessment of Source Code Obfuscation Techniques
2016 Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
A reference architecture for software protection
2016 De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
2016 Viticchie', Alessio; Avancini, Andrea; Ceccato, Mariano; Basile, Cataldo; Abrath, Bert; Coppens, Bart
Inter-function anomaly analysis for correct SDN/NFV deployment
2016 Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio
Towards Automatic Risk Analysis and Mitigation of Software Applications
2016 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions
2017 Viticchié, Alessio; Basile, Cataldo; Lioy, Antonio
Towards Optimally Hiding Protected Assets in Software Applications
2017 Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio
Assessing network authorization policies via reachability analysis
2017 Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio
Estimating Software Obfuscation Potency with Artificial Neural Networks
2017 Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio
How Professional Hackers Understand Protected Code while Performing Attack Tasks
2017 Mariano, Ceccato; Paolo, Tonella; Basile, Cataldo; Bart, Coppens; Bjorn, De Sutter; Falcarin, Paolo; Torchiano, Marco
Classification and analysis of communication protection policy anomalies
2017 Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio
On the impossibility of effectively using likely-invariants for software attestation purposes
2018 Viticchie', Alessio; Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems
2018 Carelli, Alberto; Cristofanini, Carlo Alberto; Vallero, Alessandro; Basile, Cataldo; Prinetto, Paolo; Di Carlo, Stefano
A meta-model for software protections and reverse engineering attacks
2019 Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
2019 Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
Adding Support for Automatic Enforcement of Security Policies in NFV Networks
2019 Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio; Lopez, Diego R.; Pastor Perales, Antonio
Empirical assessment of the effort needed to attack programs protected with client/server code splitting
2020 Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.
Citazione | Data di pubblicazione | Autori | File |
---|---|---|---|
Virtualized Security at the Network Edge: A User-centric Approach / Montero, D.; Yannuzzi, M.; Shaw, A.; Jacquin, L.; Pastor, A.; Serral Gracià, R.; Lioy, Antonio; Risso, FULVIO GIOVANNI OTTAVIO; Basile, Cataldo; Sassu, Roberto; Nemirovsky, M.; Ciaccia, Francesco; Georgiades, M.; Charalambides, S.; Kuusijarvi, J.; Bosco, F.. - In: IEEE COMMUNICATIONS MAGAZINE. - ISSN 0163-6804. - STAMPA. - 53:4(2015), pp. 176-186. [10.1109/MCOM.2015.7081092] | 1-gen-2015 | LIOY, ANTONIORISSO, FULVIO GIOVANNI OTTAVIOBASILE, CATALDOSASSU, ROBERTOCIACCIA, FRANCESCO + | SECURED_IEEE_CommMag_1504.pdf; SECURED_IEEE_CommMag_1504_preprint.pdf |
Analysis of application-layer filtering policies with application to HTTP / Basile, Cataldo; Lioy, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 23:1(2015), pp. 28-41. [10.1109/TNET.2013.2293625] | 1-gen-2015 | BASILE, CATALDOLIOY, ANTONIO | torsec_ieee_ton_2015.pdf; torsec_tnet_application_firewall_policies.pdf |
A Formal Model of Network Policy Analysis / Valenza, Fulvio; Spinoso, Serena; Basile, Cataldo; Sisto, Riccardo; Lioy, Antonio. - STAMPA. - (2015), pp. 516-522. (Intervento presentato al convegno RTSI 2015 - First International Forum on Research and Technologies for Society and Industry tenutosi a Torino, Italy nel 16-18 September 2015) [10.1109/RTSI.2015.7325150]. | 1-gen-2015 | VALENZA, FULVIOSPINOSO, SERENABASILE, CATALDOSISTO, RiccardoLIOY, ANTONIO | 2015RTSI.pdf; 2015RTSI_author.pdf |
Assessment of Source Code Obfuscation Techniques / Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto. - ELETTRONICO. - (2016), pp. 11-20. (Intervento presentato al convegno IEEE 16th International Working Conference on Source Code Analysis and Manipulation tenutosi a Raleigh, NC (USA) nel October 2-3, 2016) [10.1109/SCAM.2016.17]. | 1-gen-2016 | VITICCHIE', ALESSIOREGANO, LEONARDOTORCHIANO, MARCOBASILE, CATALDO + | scam2016.pdf |
A reference architecture for software protection / De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael. - STAMPA. - (2016), pp. 291-294. (Intervento presentato al convegno 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 tenutosi a Venice (Italy) nel 4-8 April 2016) [10.1109/WICSA.2016.43]. | 1-gen-2016 | BASILE, CATALDO + | - |
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks / Viticchie', Alessio; Avancini, Andrea; Ceccato, Mariano; Basile, Cataldo; Abrath, Bert; Coppens, Bart. - ELETTRONICO. - SPRO '16 Proceedings of the 2016 ACM Workshop on Software PROtection:(2016), p. 73. (Intervento presentato al convegno 2nd International Workshop on Software PROtection tenutosi a Vienna (Austria) nel 28 October 2016) [10.1145/2995306.2995315]. | 1-gen-2016 | VITICCHIE', ALESSIOBASILE, CATALDO + | - |
Inter-function anomaly analysis for correct SDN/NFV deployment / Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio. - In: INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT. - ISSN 1055-7148. - STAMPA. - 26:1(2016), pp. 25-43. [10.1002/nem.1917] | 1-gen-2016 | BASILE, CATALDOCANAVESE, DANIELELIOY, ANTONIOPITSCHEIDER, CHRISTIANVALENZA, FULVIO | 2016IJNM.pdf; 2016IJNM_author.pdf |
Towards Automatic Risk Analysis and Mitigation of Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio. - STAMPA. - (2016), pp. 120-135. (Intervento presentato al convegno WISTP 2016 - IFIP International Conference on Information Security Throey and Practice tenutosi a Heraklion, Crete (Greece) nel September 26–27, 2016) [10.1007/978-3-319-45931-8_8]. | 1-gen-2016 | REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOVITICCHIE', ALESSIOLIOY, ANTONIO | main.pdf |
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions / Viticchié, Alessio; Basile, Cataldo; Lioy, Antonio. - STAMPA. - (2017), pp. 66-82. (Intervento presentato al convegno CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems tenutosi a Dinard (France) nel September 19-21, 2017) [10.1007/978-3-319-76687-4_5]. | 1-gen-2017 | Viticchié, AlessioBasile, CataldoLioy, Antonio | - |
Towards Optimally Hiding Protected Assets in Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio. - CD-ROM. - (2017), pp. 374-385. (Intervento presentato al convegno 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) tenutosi a Prague (CZ) nel July 25-29, 2017) [10.1109/QRS.2017.47]. | 1-gen-2017 | REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOLIOY, ANTONIO | - |
Assessing network authorization policies via reachability analysis / Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio. - In: COMPUTERS & ELECTRICAL ENGINEERING. - ISSN 0045-7906. - STAMPA. - 64:(2017), pp. 110-131. [10.1016/j.compeleceng.2017.02.019] | 1-gen-2017 | BASILE, CATALDOCANAVESE, DANIELEPITSCHEIDER, CHRISTIANLIOY, ANTONIOVALENZA, FULVIO | 1-s2.0-S0045790617303695-main.pdf; 2017CAEE_author.pdf |
Estimating Software Obfuscation Potency with Artificial Neural Networks / Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio. - STAMPA. - 10547:(2017), pp. 193-202. (Intervento presentato al convegno STM - 2017: 13th International Workshop on Security and Trust Management tenutosi a Oslo (NO) nel September 14–15, 2017) [10.1007/978-3-319-68063-7_13]. | 1-gen-2017 | CANAVESE, DANIELEREGANO, LEONARDOBASILE, CATALDOVITICCHIE', ALESSIO | - |
How Professional Hackers Understand Protected Code while Performing Attack Tasks / Mariano, Ceccato; Paolo, Tonella; Basile, Cataldo; Bart, Coppens; Bjorn, De Sutter; Falcarin, Paolo; Torchiano, Marco. - STAMPA. - (2017), pp. 154-164. (Intervento presentato al convegno ICPC 2017: 25th International Conference on Program Comprehension tenutosi a Bueno Aires (Argentina) nel 22-23 Maggio) [10.1109/ICPC.2017.2]. | 1-gen-2017 | BASILE, CATALDOFALCARIN, PAOLOTORCHIANO, MARCO + | - |
Classification and analysis of communication protection policy anomalies / Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 25:5(2017), pp. 2601-2614. [10.1109/TNET.2017.2708096] | 1-gen-2017 | VALENZA, FULVIOBASILE, CATALDOCANAVESE, DANIELELIOY, ANTONIO | 07967691.pdf; 2017TNET_author.pdf |
On the impossibility of effectively using likely-invariants for software attestation purposes / Viticchie', Alessio; Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio. - In: JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS. - ISSN 2093-5374. - STAMPA. - 9:2(2018), pp. 1-25. [10.22667/JOWUA.2018.06.30.001] | 1-gen-2018 | Alessio ViticchiéCataldo BasileFulvio ValenzaAntonio Lioy | 2018BasileInvariants.pdf |
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems / Carelli, Alberto; Cristofanini, Carlo Alberto; Vallero, Alessandro; Basile, Cataldo; Prinetto, Paolo; Di Carlo, Stefano. - STAMPA. - (2018), pp. 1-6. (Intervento presentato al convegno IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018) tenutosi a Cluj-Napoca (Romania) nel 24-26 May 2018) [10.1109/AQTR.2018.8402795]. | 1-gen-2018 | Carelli, AlbertoVALLERO, ALESSANDROBasile, CataldoPrinetto, PaoloDi Carlo, Stefano + | AQTR2018_SecureBitstream.pdf |
A meta-model for software protections and reverse engineering attacks / Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn. - In: THE JOURNAL OF SYSTEMS AND SOFTWARE. - ISSN 0164-1212. - STAMPA. - 150:(2019), pp. 3-21. [10.1016/j.jss.2018.12.025] | 1-gen-2019 | Basile, CataldoCanavese, DanieleRegano, LeonardoFalcarin, Paolo + | metamodel.pdf; kbdata.pdf; 1-s2.0-S0164121218302838-main.pdf |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge / Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn. - In: EMPIRICAL SOFTWARE ENGINEERING. - ISSN 1382-3256. - STAMPA. - 24:1(2019), pp. 240-286. [10.1007/s10664-018-9625-6] | 1-gen-2019 | Basile, CataldoFalcarin, PaoloTorchiano, Marco + | 10.1007_s10664-018-9625-6.pdf |
Adding Support for Automatic Enforcement of Security Policies in NFV Networks / Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio; Lopez, Diego R.; Pastor Perales, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 27:2(2019), pp. 707-720. [10.1109/TNET.2019.2895278] | 1-gen-2019 | Cataldo BasileFulvio ValenzaAntonio Lioy + | IEEE_ACM_10.1109_TNET.2019.2895278_preprint.pdf; 08637976.pdf |
Empirical assessment of the effort needed to attack programs protected with client/server code splitting / Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.. - In: EMPIRICAL SOFTWARE ENGINEERING. - ISSN 1382-3256. - STAMPA. - 25:1(2020), pp. 1-48. [10.1007/s10664-019-09738-1] | 1-gen-2020 | Viticchie A.Regano L.Basile C.Torchiano M. + | 190725_EMSE_AssessmentCodeSplitting.pdf; 190725_EMSE_AssessmentCodeSplitting.pdf |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile