Follow
Fabio Pagani
Fabio Pagani
Vulnerability Research Lead, Binarly.
Verified email at ucsb.edu - Homepage
Title
Cited by
Cited by
Year
When hardware meets software: A bulletproof solution to forensic memory acquisition
A Reina, A Fattori, F Pagani, L Cavallaro, D Bruschi
Proceedings of the 28th annual computer security applications conference, 79-88, 2012
642012
Beyond precision and recall: understanding uses (and misuses) of similarity hashes in binary analysis
F Pagani, M Dell'Amico, D Balzarotti
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
512018
Introducing the temporal dimension to memory forensics
F Pagani, O Fedorov, D Balzarotti
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-21, 2019
402019
Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities
E Trickel, F Pagani, C Zhu, L Dresel, G Vigna, C Kruegel, R Wang, T Bao, ...
2023 IEEE symposium on security and privacy (SP), 2658-2675, 2023
372023
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images
F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022
272022
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
242020
Autoprofile: Towards automated profile generation for memory analysis
F Pagani, D Balzarotti
ACM Transactions on Privacy and Security 25 (1), 1-26, 2021
192021
Decomperson: How humans decompile and what we can learn from it
K Burk, F Pagani, C Kruegel, G Vigna
31st USENIX Security Symposium (USENIX Security 22), 2765-2782, 2022
182022
SYMBEXCEL: automated analysis and understanding of malicious excel 4.0 macros
N Ruaro, F Pagani, S Ortolani, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1066-1081, 2022
162022
Taming transactions: Towards hardware-assisted control flow integrity using transactional memory
M Muench, F Pagani, Y Shoshitaishvili, C Kruegel, G Vigna, D Balzarotti
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
152016
Back to the whiteboard: A principled approach for the assessment and design of memory forensic techniques
F Pagani, D Balzarotti
28th USENIX Security Symposium (USENIX Security 19), 1751-1768, 2019
142019
Measuring the Role of Greylisting and Nolisting in Fighting Spam
F Pagani, M De Astis, M Graziano, A Lanzi, D Balzarotti
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
82016
Regulator: Dynamic Analysis to Detect {ReDoS}
R McLaughlin, F Pagani, N Spahn, C Kruegel, G Vigna
31st USENIX Security Symposium (USENIX Security 22), 4219-4235, 2022
72022
Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
V Duta, F Freyer, F Pagani, M Muench, C Giuffrida
NDSS, 2023
62023
Advances in Memory Forensics
F Pagani
5*
Automated analysis and understanding of malicious excel 4.0 (xl4) macros
G Vigna, S Ortolani, N Ruaro, F Pagani, C Kruegel
US Patent App. 18/308,254, 2024
2024
Elisaweta Masserova Elizabeth Margolin Emiliano De Cristofaro Eric Olsson
E Zeng, B Vanleeuwen, B Abdolmaleki, B Eriksson, B Pinkas, B Oh, ...
The system can't perform the operation now. Try again later.
Articles 1–17