A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 302 | 2007 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 302 | 2007 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 302 | 2007 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM SIGPLAN Notices 42 (1), 377-388, 2007 | 302 | 2007 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM Transactions on Programming Languages and Systems (TOPLAS) 30 (5), 1-54, 2008 | 106 | 2008 |
A semantics-based approach to malware detection MD Preda, M Christodorescu, S Jha, S Debray ACM Transactions on Programming Languages and Systems (TOPLAS) 30 (5), 25, 2008 | 106 | 2008 |
Fast location of similar code fragments using semantic'juice' A Lakhotia, MD Preda, R Giacobazzi Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse …, 2013 | 92 | 2013 |
Opaque predicates detection by abstract interpretation M Dalla Preda, M Madou, K De Bosschere, R Giacobazzi Algebraic methodology and software technology, 81-95, 2006 | 84 | 2006 |
Semantic-based code obfuscation by abstract interpretation M Dalla Preda, R Giacobazzi International Colloquium on Automata, Languages, and Programming, 1325-1336, 2005 | 79 | 2005 |
Semantics-based code obfuscation by abstract interpretation M Dalla Preda, R Giacobazzi Journal of Computer Security 17 (6), 855-908, 2009 | 64 | 2009 |
Control code obfuscation by abstract interpretation M Dalla Preda, R Giacobazzi Third IEEE International Conference on Software Engineering and Formal …, 2005 | 55 | 2005 |
AIOCJ: A choreographic framework for safe adaptive distributed applications M Dalla Preda, S Giallorenzo, I Lanese, J Mauro, M Gabbrielli International Conference on Software Language Engineering, 161-170, 2014 | 46 | 2014 |
Barrier slicing for remote software trusting M Ceccato, M Dalla Preda, J Nagra, C Collberg, P Tonella Seventh IEEE International Working Conference on Source Code Analysis and …, 2007 | 36 | 2007 |
Dynamic choreographies M Dalla Preda, M Gabbrielli, S Giallorenzo, I Lanese, J Mauro International Conference on Coordination Languages and Models, 67-82, 2015 | 34 | 2015 |
Modelling metamorphism by abstract interpretation M Dalla Preda, R Giacobazzi, S Debray, K Coogan, GM Townsend International Static Analysis Symposium, 218-235, 2010 | 34 | 2010 |
Code obfuscation and malware detection by abstract interpretation M Dalla Preda PhD diss.), http://profs. sci. univr. it/dallapre/MilaDallaPreda_PhD. pdf, 2007 | 34 | 2007 |
Dynamic choreographies: Theory and implementation MD Preda, M Gabbrielli, S Giallorenzo, I Lanese, J Mauro arXiv preprint arXiv:1611.09067, 2016 | 29 | 2016 |
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology M Dalla Preda, F Maggi Journal of Computer Virology and Hacking Techniques 13 (3), 209-232, 2017 | 28 | 2017 |
Abstract symbolic automata: Mixed syntactic/semantic similarity analysis of executables M Dalla Preda, R Giacobazzi, A Lakhotia, I Mastroeni Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015 | 27 | 2015 |
Trading-off security and performance in barrier slicing for remote software entrusting M Ceccato, M Dalla Preda, J Nagra, C Collberg, P Tonella Automated Software Engineering 16 (2), 235-261, 2009 | 19 | 2009 |