S-ARP: a secure address resolution protocol
- D. Bruschi, A. Ornaghi, E. Rosti
- Computer Science19th Annual Computer Security Applications…
- 8 December 2003
A secure version of ARP that provides protection against ARP poisoning and performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.
Detecting Self-mutating Malware Using Control-Flow Graph Matching
- D. Bruschi, L. Martignoni, Mattia Monga
- Computer ScienceInternational Conference on Detection of…
- 13 July 2006
This paper proposes a strategy for the detection of metamorphic malicious code inside a program P based on the comparison of the control flow graph of P against the set of control flow graphs of known malware.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
- Emanuele Passerini, Roberto Paleari, L. Martignoni, D. Bruschi
- Computer ScienceInternational Conference on Detection of…
- 10 July 2008
FluXOR monitoring and detection strategies entirely rely on the analysis of a set of features observable from the point of view of a victim of the scams perpetrated thorough botnets, a system to detect and monitor fast-flux service networks.
Testing CPU emulators
- L. Martignoni, Roberto Paleari, G. F. Roglia, D. Bruschi
- Computer ScienceInternational Symposium on Software Testing and…
- 19 July 2009
This paper presents a testing methodology specific for CPU emulators, based on fuzzing, and analysed four state-of-the-art IA-32 emulators and found several defects in each of them, some of which can prevent the proper execution of programs.
Secure pebblenets
- S. Basagni, Kris Herrin, D. Bruschi, E. Rosti
- Computer ScienceACM Interational Symposium on Mobile Ad Hoc…
- 1 October 2001
This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering and an effective probabilistic selection of the key-generating node, which meets the requirements of efficiency, scalability and security needed for the survivability of networks of pebble (pebblenets).
Lower bounds for the broadcast problem in mobile radio networks
- D. Bruschi, M. D. Pinto
- Computer ScienceDistributed computing
- 1 April 1997
It is proved that, even assuming that the processors know the network topology, Ω(n) rounds are required for solving the problem on a complete network (D=1) with n processors.
Voice over IPsec: analysis and solutions
- Robert A. Barbieri, D. Bruschi, E. Rosti
- Computer Science18th Annual Computer Security Applications…
- 9 December 2002
An efficient solution for packet header compression, which is called cIPsec, for VoIPsec traffic, and results show that the proposed compression scheme significantly reduces the overhead of packet headers, thus increasing the effective bandwidth used by the transmission.
Diversified Process Replicæ for Defeating Memory Error Exploits
- D. Bruschi, L. Cavallaro, A. Lanzi
- Computer ScienceIEEE International Performance, Computing, and…
- 11 April 2007
This work defines pr as the replica of a process p which behaves identically to p but has some "structural" diversity from it, thus defeating absolute and partial overwriting memory error exploits and making possible to detect memory corruption attacks in a deterministic way.
A fistful of red-pills: how to automatically generate procedures to detect CPU emulators
- Roberto Paleari, L. Martignoni, G. F. Roglia, D. Bruschi
- Computer Science
- 10 August 2009
An automatic and systematic technique to generate red-pills, specific for detecting if a program is executed through a CPU emulator, for two publicly available emulators, which are widely used for analyzing malware.
A mobility-transparent deterministic broadcast mechanism for ad hoc networks
- S. Basagni, I. Chlamtac, D. Bruschi
- Computer ScienceTNET
- 1 December 1999
The deterministic broadcast protocols introduced in this paper overcome the above limitations by using a novel mobility-transparent schedule, thus providing a delivery (time) guarantee without the need to recompute the schedules when topology changes.
...
...