Follow
Nilo Redini
Title
Cited by
Cited by
Year
Toward the analysis of embedded firmware through automated re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1562019
Karonte: Detecting insecure multi-binary interactions in embedded firmware
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020
1272020
{BootStomp}: On the security of bootloaders in mobile devices
N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ...
26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017
832017
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices
N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ...
2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021
722021
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019
522019
Spider: Enabling fast patch propagation in related software repositories
A Machiry, N Redini, E Camellini, C Kruegel, G Vigna
2020 IEEE Symposium on Security and Privacy (SP), 1562-1579, 2020
482020
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images
F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022
272022
Conware: Automated modeling of hardware peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
262021
Using loops for malware classification resilient to feature-unaware perturbations
A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
262018
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks
E Gregori, A Improta, L Lenzini, V Luconi, N Redini, A Vecchio
Journal of Network and Computer Applications 64, 62-75, 2016
132016
Smartprobe: A bottleneck capacity estimation tool for smartphones
F Disperati, D Grassini, E Gregori, A Improta, L Lenzini, D Pellegrino, ...
2013 IEEE International Conference on Green Computing and Communications and …, 2013
72013
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
E Gustafson, P Grosen, N Redini, S Jha, A Continella, R Wang, K Fu, ...
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
52023
Analyzing and securing firmware for IoT devices
N Redini
University of California, Santa Barbara, 2020
22020
Towards automatically generating a sound and complete dataset for evaluating static analysis tools
A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna
Workshop on Binary Analysis Research (BAR), 2019
22019
C: Automated Modeling of Hardware Peripherals
C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ...
2021
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ...
Black Hat Asia 2020, 2020
2020
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
YR Choe, A Machiry, N Redini, ED Gustafson, Y Fratantonio, C Kruegel, ...
Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2018
2018
Access control in distributed file systems: design and realization on Pepys fs
N Redini
2013
Access Control for the Pepys Internet-wide File-System
T Cucinotta, N Redini, G Dini
Proceedings of the 7th International Workshop on Plan 9 (IWP9 2012), 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–19