Assessment of source code obfuscation techniques A Viticchié, L Regano, M Torchiano, C Basile, M Ceccato, P Tonella, ... 2016 IEEE 16th international working conference on source code analysis and …, 2016 | 64 | 2016 |
Reactive attestation: Automatic detection and reaction to software tampering attacks A Viticchié, C Basile, A Avancini, M Ceccato, B Abrath, B Coppens Proceedings of the 2016 ACM workshop on software PROtection, 73-84, 2016 | 28 | 2016 |
Empirical assessment of the effort needed to attack programs protected with client/server code splitting A Viticchié, L Regano, C Basile, M Torchiano, M Ceccato, P Tonella Empirical Software Engineering 25, 1-48, 2020 | 19 | 2020 |
Estimating software obfuscation potency with artificial neural networks D Canavese, L Regano, C Basile, A Viticchié Security and Trust Management: 13th International Workshop, STM 2017, Oslo …, 2017 | 17 | 2017 |
Privacy issues of ISPs in the modern web AS Khatouni, M Trevisan, L Regano, A Viticchié 2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017 | 11 | 2017 |
Towards automatic risk analysis and mitigation of software applications L Regano, D Canavese, C Basile, A Viticchié, A Lioy Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016 | 9 | 2016 |
Remotely assessing integrity of software applications by monitoring invariants: Present limitations and future directions A Viticchié, C Basile, A Lioy Risks and Security of Internet and Systems: 12th International Conference …, 2018 | 4 | 2018 |
Comparative analysis of neural networks techniques to forecast Airfare Prices A Aliberti, Y Xin, A Viticchié, E Macii, E Patti 2023 IEEE 47th Annual Computers, Software, and Applications Conference …, 2023 | 3 | 2023 |
On the impossibility of effectively using likely-invariants for software attestation purposes. A Viticchié, C Basile, F Valenza, A Lioy J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 1-25, 2018 | 3 | 2018 |
Enhancing OT Threat Modelling: An Effective Rule-Based Approach for Attack Graph Generation G Sunder, AS Colletto, S Raimondi, C Basile, A Viticchié, A Aliberti ICSC: Intelligent Cybersecurity Conference, 2, 2024 | 1 | 2024 |
GAIA meta-platform: enabling multi-energy vectors data analysis via IoT federation A Viticchié, F Cetrone, C Camarda, V Vassallo, L Napoli, E Patti, A Aliberti 2024 IEEE International Conference on Environment and Electrical Engineering …, 2024 | | 2024 |
On the applicability of software attestation techniques to embedded systems. M Zudettich Politecnico di Torino, 2019 | | 2019 |
Software Attestation with Static and Dynamic Techniques. A Viticchié Polytechnic University of Turin, Italy, 2019 | | 2019 |