


default search action
Roberto Paleari
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j1]Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi:
A methodology for testing CPU emulators. ACM Trans. Softw. Eng. Methodol. 22(4): 29:1-29:26 (2013) - 2010
- [c15]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Conqueror: Tamper-Proof Code Execution on Legacy Systems. DIMVA 2010: 21-40 - [c14]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing system virtual machines. ISSTA 2010: 171-182 - [c13]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
N-version disassembly: differential testing of x86 disassemblers. ISSTA 2010: 265-274 - [c12]Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga
:
Dynamic and transparent analysis of commodity production systems. ASE 2010: 417-426 - [c11]Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro
:
Live and Trustworthy Forensic Analysis of Commodity Production Systems. RAID 2010: 297-316 - [c10]Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jonathon T. Giffin, Somesh Jha:
Automatic Generation of Remediation Procedures for Malware Infections. USENIX Security Symposium 2010: 419-434 - [i1]Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga:
Dynamic and Transparent Analysis of Commodity Production Systems. CoRR abs/1006.5845 (2010)
2000 – 2009
- 2009
- [c9]Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
Surgically Returning to Randomized lib(c). ACSAC 2009: 60-69 - [c8]Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni:
How Good Are Malware Detectors at Remediating Infected Systems?. DIMVA 2009: 21-37 - [c7]Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
A Framework for Behavior-Based Malware Analysis in the Cloud. ICISS 2009: 178-192 - [c6]Mattia Monga
, Roberto Paleari, Emanuele Passerini:
A hybrid analysis framework for detecting web application vulnerabilities. SESS@ICSE 2009: 25-32 - [c5]Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi:
Testing CPU emulators. ISSTA 2009: 261-272 - [c4]Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, Danilo Bruschi:
A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. WOOT 2009: 1-7 - 2008
- [c3]Roberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga
:
On Race Vulnerabilities in Web Applications. DIMVA 2008: 126-142 - [c2]Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi:
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. DIMVA 2008: 186-206 - 2007
- [c1]Andrea Lanzi, Lorenzo Martignoni, Mattia Monga
, Roberto Paleari:
A Smart Fuzzer for x86 Executables. SESS@ICSE 2007: 7
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint