Mattia Monga
Cited by
Cited by
Detecting self-mutating malware using control-flow graph matching
D Bruschi, L Martignoni, M Monga
Detection of Intrusions and Malware & Vulnerability Assessment: Third …, 2006
Code normalization for self-mutating malware
D Bruschi, L Martignoni, M Monga
IEEE Security & Privacy 5 (2), 46-54, 2007
Synthesizing intensional behavior models by graph transformation
C Ghezzi, A Mocci, M Monga
2009 IEEE 31st International Conference on Software Engineering, 430-440, 2009
Assessing the risk of using vulnerable components
D Balzarotti, M Monga, S Sicari
Quality of Protection: Security Measurements and Metrics, 65-77, 2006
Using Code Normalization for Fighting Self-Mutating Malware.
D Bruschi, L Martignoni, M Monga
ISSSE, 2006
Dynamic and transparent analysis of commodity production systems
A Fattori, R Paleari, L Martignoni, M Monga
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
Replay attack in TCG specification and solution
D Bruschi, L Cavallaro, A Lanzi, M Monga
21st Annual Computer Security Applications Conference (ACSAC'05), 11 pp.-137, 2005
LISABETH: automated content-based signature generator for zero-day polymorphic worms
L Cavallaro, A Lanzi, L Mayer, M Monga
Proceedings of the fourth international workshop on Software engineering for …, 2008
Carrying on the e-learning process with a workflow management engine
M Cesarini, M Monga, R Tedesco
Proceedings of the 2004 ACM symposium on Applied computing, 940-945, 2004
A smart fuzzer for x86 executables
A Lanzi, L Martignoni, M Monga, R Paleari
Third International Workshop on Software Engineering for Secure Systems …, 2007
Interaction analysis in aspect-oriented models
K Mehner, M Monga, G Taentzer
14th IEEE international requirements engineering conference (RE'06), 69-78, 2006
A hybrid analysis framework for detecting web application vulnerabilities
M Monga, R Paleari, E Passerini
2009 ICSE Workshop on Software Engineering for Secure Systems, 25-32, 2009
Supporting interoperability and reusability of learning objects: The virtual campus approach
E Di Nitto, L Mainetti, M Monga, L Sbattella, R Tedesco
Journal of Educational Technology & Society 9 (2), 33-50, 2006
Security games for node localization through verifiable multilateration
N Basilico, N Gatti, M Monga, S Sicari
IEEE Transactions on Dependable and Secure Computing 11 (1), 72-85, 2013
An experience on verification of aspect properties
G Denaro, M Monga
Proceedings of the 4th international workshop on Principles of software …, 2001
Informatics education in Italian secondary schools
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli, ...
ACM Transactions on Computing Education (TOCE) 14 (2), 1-6, 2014
On race vulnerabilities in web applications
R Paleari, D Marrone, D Bruschi, M Monga
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
A formal framework for specifying and verifying microservices based process flows
M Camilli, C Bellettini, L Capra, M Monga
Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018
Slicing AspectJ woven code
D Balzarotti, A Castaldo, LC D’Ursi, M Monga
FOAL 2005 Proceedings, 27, 2005
How challenging are Bebras tasks? An IRT analysis based on the performance of Italian students
C Bellettini, V Lonati, D Malchiodi, M Monga, A Morpurgo, M Torelli
Proceedings of the 2015 ACM conference on innovation and technology in …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20