Mila Dalla Preda
Università degli Studi di Verona
H-index: 20
Europe-Italy
Top articles of Mila Dalla Preda
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Exploiting number theory for dynamic software watermarking | Journal of Computer Virology and Hacking Techniques | Mila Dalla Preda Michele Ianni | 2024/3 |
Monotonicity and the Precision of Program Analysis | Proceedings of the ACM on Programming Languages | Marco Campion Mila Dalla Preda Roberto Giacobazzi Caterina Urban | 2024/1/5 |
Computer Security. ESORICS 2023 International Workshops | Sokratis Katsikas | 2023/9/25 | |
Exploring NFT Validation through Digital Watermarking | Mila Dalla Preda Francesco Masaia | 2023/8/29 | |
Towards Obfuscation of Programmable Logic Controllers | Vittoria Cozza Mila Dalla Preda Marco Lucchese Massimo Merro Nicola Zannone | 2023/8/29 | |
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode | Journal of Systems and Software | Michele Pasqua Andrea Benini Filippo Contro Marco Crosara Mila Dalla Preda | 2023/6/1 |
A Formal Framework to Measure the Incompleteness of Abstract Interpretations | Marco Campion Caterina Urban Mila Dalla Preda Roberto Giacobazzi | 2023/10/22 | |
Partial (in) completeness in abstract interpretation: limiting the imprecision in program analysis | Proceedings of the ACM on Programming Languages | Marco Campion Mila Dalla Preda Roberto Giacobazzi | 2022/1/11 |
On the properties of partial completeness in abstract interpretation | Marco Campion Mila Dalla Preda Roberto Giacobazzi | 2022 | |
Dataset characteristics for reliable code authorship attribution | IEEE Transactions on Dependable and Secure Computing | Farzaneh Abazari Enrico Branca Norah Ridley Natalia Stakhanova Mila Dalla Preda | 2021/12/28 |
Data augmentation and transfer learning to classify malware images in a deep learning context | Journal of Computer Virology and Hacking Techniques | Niccolò Marastoni Roberto Giacobazzi Mila Dalla Preda | 2021/12 |
Learning metamorphic malware signatures from samples | Journal of Computer Virology and Hacking Techniques | Marco Campion Mila Dalla Preda Roberto Giacobazzi | 2021/9 |
Ethersolve: Computing an accurate control-flow graph from ethereum bytecode | arXiv preprint arXiv:2103.09113 | Filippo Contro Marco Crosara Mariano Ceccato Mila Dalla Preda | 2021/3/16 |
Dagstuhl Reports, Vol. 9, Issue 8 ISSN 2192-5283 | Bjorn De Sutter Christian Collberg Mila Dalla Preda Brecht Wyseur Dmitriy Bilyk | 2020/2 | |
4.2 Class 2: Trace-based Attack Techniques | Software Protection Decision Support and Evaluation Methodologies | Bjorn De Sutter Christian Collberg Mila Dalla Preda Brecht Wyseur | 2020/2 |
3 Overview of Talks 3.1 On the resilience of software integrity protection techniques (work in progress) | Software Protection Decision Support and Evaluation Methodologies | Bjorn De Sutter Christian Collberg Mila Dalla Preda Brecht Wyseur | 2020/2 |
Formal framework for reasoning about the precision of dynamic analysis | Mila Dalla Preda Roberto Giacobazzi Niccoló Marastoni | 2020 | |
Revealing similarities in android malware by dissecting their methods | Michele Pasetto Niccolo Marastoni Mila Dalla Preda | 2020/9/7 | |
Towards a unifying framework for tuning analysis precision by program transformation | OPEN ACCESS SERIES IN INFORMATICS | Mila Dalla Preda | 2020 |
Software Protection Decision Support and Evaluation Methodologies | Bjorn De Sutter Christian Collberg Mila Dalla Preda Brecht Wyseur | 2020/2 |