A general constraint-centric scheduling framework for spatial architectures T Nowatzki, M Sartin-Tarm, L De Carli, K Sankaralingam, C Estan, ... ACM SIGPLAN Notices 48 (6), 495-506, 2013 | 115 | 2013 |
Cimplifier: automatically debloating containers V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 111 | 2017 |
Plug: Flexible lookup modules for rapid deployment of new protocols in high-speed routers L De Carli, Y Pan, A Kumar, C Estan, K Sankaralingam Proceedings of the ACM SIGCOMM 2009 conference on Data communication, 207-218, 2009 | 67 | 2009 |
Defending against package typosquatting M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 59* | 2020 |
Beyond pattern matching: A concurrency model for stateful deep packet inspection L De Carli, R Sommer, S Jha Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 49 | 2014 |
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini Applied Cryptography and Network Security: 18th International Conference …, 2020 | 34 | 2020 |
Security issues in language-based software ecosystems RK Vaidya, L De Carli, D Davidson, V Rastogi arXiv preprint arXiv:1903.02613, 2019 | 33 | 2019 |
Botnet protocol inference in the presence of encrypted traffic L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 33 | 2017 |
Wolf at the door: Preventing install-time attacks in npm with latch E Wyss, A Wittman, D Davidson, L De Carli Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 30 | 2022 |
Hilti: An abstract execution environment for deep, stateful network traffic analysis R Sommer, M Vallentin, L De Carli, V Paxson Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014 | 29 | 2014 |
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini Neural Computing and Applications 34 (14), 12077-12096, 2022 | 26 | 2022 |
EnCoD: Distinguishing Compressed and Encrypted File Fragments F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini Network and System Security: 14th International Conference, NSS 2020 …, 2020 | 25 | 2020 |
Systems and methods for reverse-engineering malware protocols RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha US Patent 10,050,982, 2018 | 22 | 2018 |
Increasing performances of TCP data transfers through multiple parallel connections A Baldini, L De Carli, F Risso 2009 IEEE Symposium on Computers and Communications, 630-636, 2009 | 22 | 2009 |
What the fork? finding hidden code clones in npm E Wyss, L De Carli, D Davidson Proceedings of the 44th International Conference on Software Engineering …, 2022 | 21 | 2022 |
Deep packet inspection with DFA-trees and parametrized language overapproximation D Luchaup, L De Carli, S Jha, E Bach IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 531-539, 2014 | 20 | 2014 |
Reliable detection of compressed and encrypted data F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini Neural Computing and Applications 34 (22), 20379-20393, 2022 | 17 | 2022 |
An analysis of first-party cookie exfiltration due to cname redirections T Ren, A Wittman, L De Carli, D Davidson Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021 | 14 | 2021 |
Guided feature identification and removal for resource-constrained firmware R Williams, T Ren, L De Carli, L Lu, G Smith ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (2), 1-25, 2021 | 11 | 2021 |
Experiences in co-designing a packet classification algorithm and a flexible hardware platform N Vaish, T Kooburat, L De Carli, K Sankaralingam, C Estan 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and …, 2011 | 11 | 2011 |