Sfoglia per Autore  

Opzioni
Mostrati risultati da 21 a 40 di 48
Citazione Data di pubblicazione Autori File
Virtualized Security at the Network Edge: A User-centric Approach / Montero, D.; Yannuzzi, M.; Shaw, A.; Jacquin, L.; Pastor, A.; Serral Gracià, R.; Lioy, Antonio; Risso, FULVIO GIOVANNI OTTAVIO; Basile, Cataldo; Sassu, Roberto; Nemirovsky, M.; Ciaccia, Francesco; Georgiades, M.; Charalambides, S.; Kuusijarvi, J.; Bosco, F.. - In: IEEE COMMUNICATIONS MAGAZINE. - ISSN 0163-6804. - STAMPA. - 53:4(2015), pp. 176-186. [10.1109/MCOM.2015.7081092] 1-gen-2015 LIOY, ANTONIORISSO, FULVIO GIOVANNI OTTAVIOBASILE, CATALDOSASSU, ROBERTOCIACCIA, FRANCESCO + SECURED_IEEE_CommMag_1504.pdfSECURED_IEEE_CommMag_1504_preprint.pdf
Analysis of application-layer filtering policies with application to HTTP / Basile, Cataldo; Lioy, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 23:1(2015), pp. 28-41. [10.1109/TNET.2013.2293625] 1-gen-2015 BASILE, CATALDOLIOY, ANTONIO torsec_ieee_ton_2015.pdftorsec_tnet_application_firewall_policies.pdf
A Formal Model of Network Policy Analysis / Valenza, Fulvio; Spinoso, Serena; Basile, Cataldo; Sisto, Riccardo; Lioy, Antonio. - STAMPA. - (2015), pp. 516-522. (Intervento presentato al convegno RTSI 2015 - First International Forum on Research and Technologies for Society and Industry tenutosi a Torino, Italy nel 16-18 September 2015) [10.1109/RTSI.2015.7325150]. 1-gen-2015 VALENZA, FULVIOSPINOSO, SERENABASILE, CATALDOSISTO, RiccardoLIOY, ANTONIO 2015RTSI.pdf2015RTSI_author.pdf
Assessment of Source Code Obfuscation Techniques / Viticchie', Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto. - ELETTRONICO. - (2016), pp. 11-20. (Intervento presentato al convegno IEEE 16th International Working Conference on Source Code Analysis and Manipulation tenutosi a Raleigh, NC (USA) nel October 2-3, 2016) [10.1109/SCAM.2016.17]. 1-gen-2016 VITICCHIE', ALESSIOREGANO, LEONARDOTORCHIANO, MARCOBASILE, CATALDO + scam2016.pdf
A reference architecture for software protection / De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael. - STAMPA. - (2016), pp. 291-294. (Intervento presentato al convegno 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016 tenutosi a Venice (Italy) nel 4-8 April 2016) [10.1109/WICSA.2016.43]. 1-gen-2016 BASILE, CATALDO + -
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks / Viticchie', Alessio; Avancini, Andrea; Ceccato, Mariano; Basile, Cataldo; Abrath, Bert; Coppens, Bart. - ELETTRONICO. - SPRO '16 Proceedings of the 2016 ACM Workshop on Software PROtection:(2016), p. 73. (Intervento presentato al convegno 2nd International Workshop on Software PROtection tenutosi a Vienna (Austria) nel 28 October 2016) [10.1145/2995306.2995315]. 1-gen-2016 VITICCHIE', ALESSIOBASILE, CATALDO + -
Inter-function anomaly analysis for correct SDN/NFV deployment / Basile, Cataldo; Canavese, Daniele; Lioy, Antonio; Pitscheider, Christian; Valenza, Fulvio. - In: INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT. - ISSN 1055-7148. - STAMPA. - 26:1(2016), pp. 25-43. [10.1002/nem.1917] 1-gen-2016 BASILE, CATALDOCANAVESE, DANIELELIOY, ANTONIOPITSCHEIDER, CHRISTIANVALENZA, FULVIO 2016IJNM.pdf2016IJNM_author.pdf
Towards Automatic Risk Analysis and Mitigation of Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Viticchie', Alessio; Lioy, Antonio. - STAMPA. - (2016), pp. 120-135. (Intervento presentato al convegno WISTP 2016 - IFIP International Conference on Information Security Throey and Practice tenutosi a Heraklion, Crete (Greece) nel September 26–27, 2016) [10.1007/978-3-319-45931-8_8]. 1-gen-2016 REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOVITICCHIE', ALESSIOLIOY, ANTONIO main.pdf
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions / Viticchié, Alessio; Basile, Cataldo; Lioy, Antonio. - STAMPA. - (2017), pp. 66-82. (Intervento presentato al convegno CRiSIS-2017: 12th Int. Conf. on Risks and Security of Internet and Systems tenutosi a Dinard (France) nel September 19-21, 2017) [10.1007/978-3-319-76687-4_5]. 1-gen-2017 Viticchié, AlessioBasile, CataldoLioy, Antonio -
Towards Optimally Hiding Protected Assets in Software Applications / Regano, Leonardo; Canavese, Daniele; Basile, Cataldo; Lioy, Antonio. - CD-ROM. - (2017), pp. 374-385. (Intervento presentato al convegno 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) tenutosi a Prague (CZ) nel July 25-29, 2017) [10.1109/QRS.2017.47]. 1-gen-2017 REGANO, LEONARDOCANAVESE, DANIELEBASILE, CATALDOLIOY, ANTONIO -
Assessing network authorization policies via reachability analysis / Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio. - In: COMPUTERS & ELECTRICAL ENGINEERING. - ISSN 0045-7906. - STAMPA. - 64:(2017), pp. 110-131. [10.1016/j.compeleceng.2017.02.019] 1-gen-2017 BASILE, CATALDOCANAVESE, DANIELEPITSCHEIDER, CHRISTIANLIOY, ANTONIOVALENZA, FULVIO 1-s2.0-S0045790617303695-main.pdf2017CAEE_author.pdf
Estimating Software Obfuscation Potency with Artificial Neural Networks / Canavese, Daniele; Regano, Leonardo; Basile, Cataldo; Viticchie', Alessio. - STAMPA. - 10547:(2017), pp. 193-202. (Intervento presentato al convegno STM - 2017: 13th International Workshop on Security and Trust Management tenutosi a Oslo (NO) nel September 14–15, 2017) [10.1007/978-3-319-68063-7_13]. 1-gen-2017 CANAVESE, DANIELEREGANO, LEONARDOBASILE, CATALDOVITICCHIE', ALESSIO -
How Professional Hackers Understand Protected Code while Performing Attack Tasks / Mariano, Ceccato; Paolo, Tonella; Basile, Cataldo; Bart, Coppens; Bjorn, De Sutter; Falcarin, Paolo; Torchiano, Marco. - STAMPA. - (2017), pp. 154-164. (Intervento presentato al convegno ICPC 2017: 25th International Conference on Program Comprehension tenutosi a Bueno Aires (Argentina) nel 22-23 Maggio) [10.1109/ICPC.2017.2]. 1-gen-2017 BASILE, CATALDOFALCARIN, PAOLOTORCHIANO, MARCO + -
Classification and analysis of communication protection policy anomalies / Valenza, Fulvio; Basile, Cataldo; Canavese, Daniele; Lioy, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 25:5(2017), pp. 2601-2614. [10.1109/TNET.2017.2708096] 1-gen-2017 VALENZA, FULVIOBASILE, CATALDOCANAVESE, DANIELELIOY, ANTONIO 07967691.pdf2017TNET_author.pdf
On the impossibility of effectively using likely-invariants for software attestation purposes / Viticchie', Alessio; Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio. - In: JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS. - ISSN 2093-5374. - STAMPA. - 9:2(2018), pp. 1-25. [10.22667/JOWUA.2018.06.30.001] 1-gen-2018 Alessio ViticchiéCataldo BasileFulvio ValenzaAntonio Lioy 2018BasileInvariants.pdf
Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems / Carelli, Alberto; Cristofanini, Carlo Alberto; Vallero, Alessandro; Basile, Cataldo; Prinetto, Paolo; Di Carlo, Stefano. - STAMPA. - (2018), pp. 1-6. (Intervento presentato al convegno IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2018) tenutosi a Cluj-Napoca (Romania) nel 24-26 May 2018) [10.1109/AQTR.2018.8402795]. 1-gen-2018 Carelli, AlbertoVALLERO, ALESSANDROBasile, CataldoPrinetto, PaoloDi Carlo, Stefano + AQTR2018_SecureBitstream.pdf
A meta-model for software protections and reverse engineering attacks / Basile, Cataldo; Canavese, Daniele; Regano, Leonardo; Falcarin, Paolo; De Sutter, Bjorn. - In: THE JOURNAL OF SYSTEMS AND SOFTWARE. - ISSN 0164-1212. - STAMPA. - 150:(2019), pp. 3-21. [10.1016/j.jss.2018.12.025] 1-gen-2019 Basile, CataldoCanavese, DanieleRegano, LeonardoFalcarin, Paolo + metamodel.pdfkbdata.pdf1-s2.0-S0164121218302838-main.pdf
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge / Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn. - In: EMPIRICAL SOFTWARE ENGINEERING. - ISSN 1382-3256. - STAMPA. - 24:1(2019), pp. 240-286. [10.1007/s10664-018-9625-6] 1-gen-2019 Basile, CataldoFalcarin, PaoloTorchiano, Marco + 10.1007_s10664-018-9625-6.pdf
Adding Support for Automatic Enforcement of Security Policies in NFV Networks / Basile, Cataldo; Valenza, Fulvio; Lioy, Antonio; Lopez, Diego R.; Pastor Perales, Antonio. - In: IEEE-ACM TRANSACTIONS ON NETWORKING. - ISSN 1063-6692. - STAMPA. - 27:2(2019), pp. 707-720. [10.1109/TNET.2019.2895278] 1-gen-2019 Cataldo BasileFulvio ValenzaAntonio Lioy + IEEE_ACM_10.1109_TNET.2019.2895278_preprint.pdf08637976.pdf
Empirical assessment of the effort needed to attack programs protected with client/server code splitting / Viticchie, A.; Regano, L.; Basile, C.; Torchiano, M.; Ceccato, M.; Tonella, P.. - In: EMPIRICAL SOFTWARE ENGINEERING. - ISSN 1382-3256. - STAMPA. - 25:1(2020), pp. 1-48. [10.1007/s10664-019-09738-1] 1-gen-2020 Viticchie A.Regano L.Basile C.Torchiano M. + 190725_EMSE_AssessmentCodeSplitting.pdf190725_EMSE_AssessmentCodeSplitting.pdf
Mostrati risultati da 21 a 40 di 48
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile