Detecting self-mutating malware using control-flow graph matching D Bruschi, L Martignoni, M Monga Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006 | 345 | 2006 |
Code normalization for self-mutating malware D Bruschi, L Martignoni, M Monga IEEE Security & Privacy 5 (2), 46-54, 2007 | 120 | 2007 |
Synthesizing intensional behavior models by graph transformation C Ghezzi, A Mocci, M Monga 2009 IEEE 31st International Conference on Software Engineering, 430-440, 2009 | 114 | 2009 |
Assessing the risk of using vulnerable components D Balzarotti, M Monga, S Sicari Quality of Protection: Security Measurements and Metrics, 65-77, 2006 | 101 | 2006 |
Using Code Normalization for Fighting Self-Mutating Malware. D Bruschi, L Martignoni, M Monga ISSSE, 2006 | 87 | 2006 |
Dynamic and transparent analysis of commodity production systems A Fattori, R Paleari, L Martignoni, M Monga Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010 | 76 | 2010 |
Replay attack in TCG specification and solution D Bruschi, L Cavallaro, A Lanzi, M Monga 21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005 | 75* | 2005 |
LISABETH: automated content-based signature generator for zero-day polymorphic worms L Cavallaro, A Lanzi, L Mayer, M Monga Proceedings of the fourth international workshop on Software engineering for …, 2008 | 73 | 2008 |
Carrying on the e-learning process with a workflow management engine M Cesarini, M Monga, R Tedesco Proceedings of the 2004 ACM symposium on Applied computing, 940-945, 2004 | 73 | 2004 |
A smart fuzzer for x86 executables A Lanzi, L Martignoni, M Monga, R Paleari Third International Workshop on Software Engineering for Secure Systems …, 2007 | 52 | 2007 |
Interaction analysis in aspect-oriented models K Mehner, M Monga, G Taentzer 14th IEEE international requirements engineering conference (RE'06), 69-78, 2006 | 51 | 2006 |
A hybrid analysis framework for detecting web application vulnerabilities M Monga, R Paleari, E Passerini 2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009 | 44 | 2009 |
Supporting interoperability and reusability of learning objects: The virtual campus approach E Di Nitto, L Mainetti, M Monga, L Sbattella, R Tedesco Journal of Educational Technology & Society 9 (2), 33-50, 2006 | 43 | 2006 |
Security games for node localization through verifiable multilateration N Basilico, N Gatti, M Monga, S Sicari IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013 | 41 | 2013 |
An experience on verification of aspect properties G Denaro, M Monga Proceedings of the 4th international workshop on Principles of software …, 2001 | 41 | 2001 |
Informatics education in Italian secondary schools C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli, ... ACM Transactions on Computing Education (TOCE) 14 (2), 1-6, 2014 | 38 | 2014 |
On race vulnerabilities in web applications R Paleari, D Marrone, D Bruschi, M Monga Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 38 | 2008 |
A formal framework for specifying and verifying microservices based process flows M Camilli, C Bellettini, L Capra, M Monga Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018 | 33 | 2018 |
Slicing AspectJ woven code D Balzarotti, A Castaldo, LC D’Ursi, M Monga FOAL 2005 Proceedings, 27, 2005 | 33 | 2005 |
How challenging are Bebras tasks? An IRT analysis based on the performance of Italian students C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli Proceedings of the 2015 ACM conference on innovation and technology in …, 2015 | 32 | 2015 |