Follow
Nilo Redini
Title
Cited by
Cited by
Year
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
872019
BootStomp: On the Security of Bootloaders in Mobile Devices.
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
USENIX Security Symposium, 781-798, 2017
572017
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
562020
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021
272021
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
252019
Spider: Enabling fast patch propagation in related software repositories
A Machiry, N Redini, E Camellini, C Kruegel, G Vigna
2020 IEEE Symposium on Security and Privacy (SP), 1562-1579, 2020
242020
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
182018
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks
E Gregori, A Improta, L Lenzini, V Luconi, N Redini, A Vecchio
Journal of Network and Computer Applications 64, 62-75, 2016
122016
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
112021
Smartprobe: A bottleneck capacity estimation tool for smartphones
F Disperati, D Grassini, E Gregori, A Improta, L Lenzini, D Pellegrino, ...
2013 IEEE International Conference on Green Computing and Communications and …, 2013
62013
Towards automatically generating a sound and complete dataset for evaluating static analysis tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
22019
Analyzing and Securing Firmware for IoT Devices
N Redini
University of California, Santa Barbara, 2020
12020
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022
2022
C: Automated Modeling of Hardware Peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
2021
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
Black Hat Asia 2020, 2020
2020
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
YR Choe, A Machiry, N Redini, ED Gustafson, Y Fratantonio, C Kruegel, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2018
2018
Access control in distributed file systems: design and realization on Pepys fs
N Redini
2013
Access Control for the Pepys Internet-wide File-System
T Cucinotta, N Redini, G Dini
2012
The system can't perform the operation now. Try again later.
Articles 1–18