default search action
Lorenzo De Carli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Elizabeth Wyss, Drew Davidson, Lorenzo De Carli:
What's in a URL? An Analysis of Hardcoded URLs in npm Packages. SCORED@CCS 2024: 26-32 - 2023
- [c31]Faiza Tazi, Suleiman Saka, Griffin Opp, Shradha Neupane, Sanchari Das, Lorenzo De Carli, Indrakshi Ray:
Accessibility Evaluation of IoT Android Mobile Companion Apps. CHI Extended Abstracts 2023: 19:1-19:7 - [c30]Sufiyan Bukhari, Benjamin Tan, Lorenzo De Carli:
Distinguishing AI- and Human-Generated Code: A Case Study. SCORED@CCS 2023: 17-25 - [c29]Elizabeth Wyss, Lorenzo De Carli, Drew Davidson:
(Nothing But) Many Eyes Make All Bugs Shallow. SCORED@CCS 2023: 53-63 - [c28]Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli:
Beyond Typosquatting: An In-depth Look at Package Confusion. USENIX Security Symposium 2023: 3439-3456 - [e1]Santiago Torres-Arias, Lorenzo De Carli, Yuchen Zhang:
Proceedings of the 2024 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2023, ISBN 979-8-4007-1240-1 [contents] - [i7]Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini:
Minerva: A File-Based Ransomware Detector. CoRR abs/2301.11050 (2023) - 2022
- [j5]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques. Neural Comput. Appl. 34(14): 12077-12096 (2022) - [j4]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable detection of compressed and encrypted data. Neural Comput. Appl. 34(22): 20379-20393 (2022) - [j3]Ryan Williams, Tongwei Ren, Lorenzo De Carli, Long Lu, Gillian Smith:
Guided Feature Identification and Removal for Resource-constrained Firmware. ACM Trans. Softw. Eng. Methodol. 31(2): 28:1-28:25 (2022) - [c27]Elizabeth Wyss, Alexander Wittman, Drew Davidson, Lorenzo De Carli:
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch. AsiaCCS 2022: 1139-1153 - [c26]Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray:
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. DBSec 2022: 162-182 - [c25]Elizabeth Wyss, Lorenzo De Carli, Drew Davidson:
What the Fork? Finding Hidden Code Clones in npm. ICSE 2022: 2415-2426 - [c24]Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu:
Breaking Embedded Software Homogeneity with Protocol Mutations. SecureComm 2022: 770-790 - 2021
- [c23]Lorenzo De Carli, Indrakshi Ray, Erin Solovey:
Vision: Stewardship of Smart Devices Security for the Aging Population. EuroUSEC 2021: 236-241 - [c22]Vishwajeet Bhosale, Lorenzo De Carli, Indrakshi Ray:
Detection of Anomalous User Activity for Home IoT Devices. IoTBDS 2021: 309-314 - [i6]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
Reliable Detection of Compressed and Encrypted Data. CoRR abs/2103.17059 (2021) - 2020
- [c21]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. ACNS (2) 2020: 254-274 - [c20]Lorenzo De Carli, Antonio Mignano:
Network Security for Home IoT Devices Must Involve the User: A Position Paper. FPS 2020: 20-28 - [c19]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. NSS 2020: 42-62 - [c18]Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi:
Defending Against Package Typosquatting. NSS 2020: 112-131 - [c17]Niels Hansen, Lorenzo De Carli, Drew Davidson:
Assessing Adaptive Attacks Against Trained JavaScript Classifiers. SecureComm (1) 2020: 190-210 - [c16]Eda Zhou, Joseph Turcotte, Lorenzo De Carli:
Enabling Security Analysis of IoT Device-to-Cloud Traffic. TrustCom 2020: 1888-1894 - [i5]Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi:
SpellBound: Defending Against Package Typosquatting. CoRR abs/2003.03471 (2020) - [i4]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
EnCoD: Distinguishing Compressed and Encrypted File Fragments. CoRR abs/2010.07754 (2020)
2010 – 2019
- 2019
- [i3]Ruturaj K. Vaidya, Lorenzo De Carli, Drew Davidson, Vaibhav Rastogi:
Security Issues in Language-based Sofware Ecosystems. CoRR abs/1903.02613 (2019) - [i2]Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini:
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes. CoRR abs/1911.02423 (2019) - 2017
- [c15]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Botnet protocol inference in the presence of encrypted traffic. INFOCOM 2017: 1-9 - [c14]Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Kali: Scalable encryption fingerprinting in dynamic malware traces. MALWARE 2017: 3-10 - [c13]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Cimplifier: automatically debloating containers. ESEC/SIGSOFT FSE 2017: 476-486 - 2016
- [i1]Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel:
Towards Least Privilege Containers with Cimplifier. CoRR abs/1602.08410 (2016) - 2014
- [j2]Tony Nowatzki, Michael Sartin-Tarm, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan, Behnam Robatmili:
A Scheduling Framework for Spatial Architectures Across Multiple Constraint-Solving Theories. ACM Trans. Program. Lang. Syst. 37(1): 2:1-2:30 (2014) - [c12]Lorenzo De Carli, Robin Sommer, Somesh Jha:
Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection. CCS 2014: 1378-1390 - [c11]Jaikrishnan Menon, Lorenzo De Carli, Vijayraghavan Thiruvengadam, Karthikeyan Sankaralingam, Cristian Estan:
Memory processing units. Hot Chips Symposium 2014: 1 - [c10]Robin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. Internet Measurement Conference 2014: 461-474 - [c9]Daniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach:
Deep packet inspection with DFA-trees and parametrized language overapproximation. INFOCOM 2014: 531-539 - 2013
- [j1]Michael Sartin-Tarm, Tony Nowatzki, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan:
Constraint centric scheduling guide. SIGARCH Comput. Archit. News 41(2): 17-21 (2013) - [c8]Sung Jin Kim, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan:
SWSL: SoftWare Synthesis for network Lookup. ANCS 2013: 191-201 - [c7]Tony Nowatzki, Michael Sartin-Tarm, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan, Behnam Robatmili:
A general constraint-centric scheduling framework for spatial architectures. PLDI 2013: 495-506 - 2012
- [c6]Eric N. Harris, Samuel L. Wasmundt, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan:
LEAP: latency- energy- and area-optimized lookup pipeline. ANCS 2012: 175-186 - 2011
- [c5]Nilay Vaish, Thawan Kooburat, Lorenzo De Carli, Karthikeyan Sankaralingam, Cristian Estan:
Experiences in Co-designing a Packet Classification Algorithm and a Flexible Hardware Platform. ANCS 2011: 189-199 - [c4]Bhavish Agarwal, Ranjita Bhagwan, Lorenzo De Carli, Venkata N. Padmanabhan, Krishna P. N. Puttaswamy:
Deja vu: fingerprinting network problems. CoNEXT 2011: 28 - 2010
- [c3]Amit Kumar, Lorenzo De Carli, Sung Jin Kim, Marc de Kruijf, Karthikeyan Sankaralingam, Cristian Estan, Somesh Jha:
Design and implementation of the PLUG architecture for programmable and efficient network lookups. PACT 2010: 331-342
2000 – 2009
- 2009
- [c2]Andrea Baldini, Lorenzo De Carli, Fulvio Risso:
Increasing performances of TCP data transfers through multiple parallel connections. ISCC 2009: 630-636 - [c1]Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Estan, Karthikeyan Sankaralingam:
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers. SIGCOMM 2009: 207-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint