Toward the analysis of embedded firmware through automated re-hosting E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 140 | 2019 |
Karonte: Detecting insecure multi-binary interactions in embedded firmware N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... 2020 IEEE Symposium on Security and Privacy (SP), 1544-1561, 2020 | 107 | 2020 |
{BootStomp}: On the security of bootloaders in mobile devices N Redini, A Machiry, D Das, Y Fratantonio, A Bianchi, E Gustafson, ... 26th USENIX Security Symposium (USENIX Security 17), 781-798, 2017 | 72 | 2017 |
Diane: Identifying fuzzing triggers in apps to generate under-constrained inputs for iot devices N Redini, A Continella, D Das, G De Pasquale, N Spahn, A Machiry, ... 2021 IEEE Symposium on Security and Privacy (SP), 484-500, 2021 | 64 | 2021 |
BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation N Redini, R Wang, A Machiry, Y Shoshitaishvili, G Vigna, C Kruegel Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 45 | 2019 |
Spider: Enabling fast patch propagation in related software repositories A Machiry, N Redini, E Camellini, C Kruegel, G Vigna 2020 IEEE Symposium on Security and Privacy (SP), 1562-1579, 2020 | 44 | 2020 |
Using loops for malware classification resilient to feature-unaware perturbations A Machiry, N Redini, E Gustafson, Y Fratantonio, YR Choe, C Kruegel, ... Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 25 | 2018 |
Conware: Automated modeling of hardware peripherals C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ... Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021 | 24 | 2021 |
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna 2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022 | 16 | 2022 |
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks E Gregori, A Improta, L Lenzini, V Luconi, N Redini, A Vecchio Journal of Network and Computer Applications 64, 62-75, 2016 | 13 | 2016 |
Smartprobe: A bottleneck capacity estimation tool for smartphones F Disperati, D Grassini, E Gregori, A Improta, L Lenzini, D Pellegrino, ... 2013 IEEE International Conference on Green Computing and Communications and …, 2013 | 6 | 2013 |
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images E Gustafson, P Grosen, N Redini, S Jha, A Continella, R Wang, K Fu, ... Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 3 | 2023 |
Analyzing and securing firmware for IoT devices N Redini University of California, Santa Barbara, 2020 | 2 | 2020 |
Towards automatically generating a sound and complete dataset for evaluating static analysis tools A Machiry, N Redini, E Gustafson, H Aghakhani, C Kruegel, G Vigna Workshop on Binary Analysis Research (BAR), 2019 | 2 | 2019 |
C: Automated Modeling of Hardware Peripherals C Spensky, A Machiry, N Redini, C Unger, G Foster, E Blasband, ... | | 2021 |
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale N Redini, A Machiry, R Wang, C Spensky, A Continella, Y Shoshitaishvili, ... Black Hat Asia 2020, 2020 | | 2020 |
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. YR Choe, A Machiry, N Redini, ED Gustafson, Y Fratantonio, C Kruegel, ... Sandia National Lab.(SNL-CA), Livermore, CA (United States), 2018 | | 2018 |
Access control in distributed file systems: design and realization on Pepys fs N Redini | | 2013 |
Access Control for the Pepys Internet-wide File-System T Cucinotta, N Redini, G Dini Proceedings of the 7th International Workshop on Plan 9 (IWP9 2012), 2012 | | 2012 |