D'ELIA, DANIELE CONO
 Distribuzione geografica
Continente #
NA - Nord America 1.521
EU - Europa 992
AS - Asia 974
AF - Africa 59
SA - Sud America 40
OC - Oceania 17
Continente sconosciuto - Info sul continente non disponibili 3
Totale 3.606
Nazione #
US - Stati Uniti d'America 1.452
CN - Cina 424
IT - Italia 281
DE - Germania 130
RU - Federazione Russa 113
TW - Taiwan 91
HK - Hong Kong 89
GB - Regno Unito 88
FR - Francia 82
IN - India 62
CA - Canada 61
KR - Corea 58
JP - Giappone 44
SG - Singapore 40
CZ - Repubblica Ceca 38
ES - Italia 38
ID - Indonesia 38
IR - Iran 36
NL - Olanda 35
BR - Brasile 28
IE - Irlanda 28
SE - Svezia 26
IL - Israele 24
UA - Ucraina 21
TR - Turchia 17
AT - Austria 16
AU - Australia 16
RO - Romania 16
BE - Belgio 13
CH - Svizzera 13
ZA - Sudafrica 13
MA - Marocco 10
FI - Finlandia 8
KE - Kenya 8
EG - Egitto 7
NO - Norvegia 7
VN - Vietnam 7
GR - Grecia 6
PK - Pakistan 6
PL - Polonia 6
SA - Arabia Saudita 6
CL - Cile 5
MY - Malesia 5
NP - Nepal 5
DK - Danimarca 4
LB - Libano 4
LK - Sri Lanka 4
MT - Malta 4
PT - Portogallo 4
TH - Thailandia 4
AE - Emirati Arabi Uniti 3
CR - Costa Rica 3
DZ - Algeria 3
EU - Europa 3
KH - Cambogia 3
LT - Lituania 3
MX - Messico 3
NG - Nigeria 3
SC - Seychelles 3
SI - Slovenia 3
TZ - Tanzania 3
VE - Venezuela 3
AL - Albania 2
AR - Argentina 2
ET - Etiopia 2
LI - Liechtenstein 2
AZ - Azerbaigian 1
BD - Bangladesh 1
BO - Bolivia 1
CM - Camerun 1
CO - Colombia 1
DO - Repubblica Dominicana 1
EE - Estonia 1
HR - Croazia 1
HU - Ungheria 1
JO - Giordania 1
MD - Moldavia 1
ML - Mali 1
NZ - Nuova Zelanda 1
PH - Filippine 1
RS - Serbia 1
SD - Sudan 1
SZ - Regno dello Swaziland 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
ZM - Zambia 1
ZW - Zimbabwe 1
Totale 3.606
Città #
Menlo Park 160
Houston 116
Rome 104
Ann Arbor 100
Ashburn 88
Fairfield 84
Taipei 63
Buffalo 57
Guangzhou 52
Santa Cruz 52
Seattle 47
Changsha 43
Storm Lake 43
Cambridge 41
Shenyang 40
Woodbridge 39
Beijing 33
Wilmington 32
Hangzhou 26
Saint Petersburg 24
Chicago 20
Nanjing 19
Bengaluru 17
Central 17
Council Bluffs 17
Dublin 17
Paris 17
Rio de Janeiro 17
San Diego 17
Toronto 17
Chongqing 15
Boardman 14
Los Angeles 14
Central District 13
Milan 13
Shanghai 13
Fleming Island 12
Singapore 12
Harbin 11
Lake Forest 11
Ottawa 11
Bilbao 10
Wöllstein 10
London 9
Muizenberg 9
Munich 9
Vienna 9
Zhengzhou 9
Chengdu 8
Fort Lauderdale 8
Mid Levels 8
Mountain View 8
Raanana 8
Stockholm 8
Wuhan 8
Xian 8
Hanover 7
Hebei 7
Lafayette 7
New York 7
Rochester 7
Seoul 7
Breitenfelde 6
Changchun 6
Dallas 6
Fremont 6
Gurgaon 6
Hanoi 6
Istanbul 6
Moscow 6
Nanchang 6
Rennes 6
Tokyo 6
University Park 6
Atlanta 5
Baotou 5
Brooklyn 5
Geumjeong-gu 5
Hamilton 5
Helsinki 5
Jinan 5
Kish 5
Kunming 5
Little Rock 5
Livermore 5
Mumbai 5
Nairobi 5
Phoenix 5
Southend 5
West Lafayette 5
Amsterdam 4
Andover 4
Bad Kreuznach 4
Berlin 4
Bochum 4
Cairo 4
Charlotte 4
Dachsbach 4
Daejeon 4
Denpasar 4
Totale 1.921
Nome #
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution, file e3835322-4ee0-15e8-e053-a505fe0a3de9 1.412
The ROP needle: Hiding trigger-based injection vectors via code reuse, file e3835321-e0d9-15e8-e053-a505fe0a3de9 480
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed), file e3835321-c44d-15e8-e053-a505fe0a3de9 459
On-stack replacement, distilled, file e383531a-854c-15e8-e053-a505fe0a3de9 312
A Survey of Symbolic Execution Techniques, file e3835319-e9a3-15e8-e053-a505fe0a3de9 220
Rethinking Pointer Reasoning in Symbolic Execution, file e3835319-b9eb-15e8-e053-a505fe0a3de9 211
SymNav: Visually Assisting Symbolic Execution, file e3835323-875e-15e8-e053-a505fe0a3de9 178
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization, file e383532d-c723-15e8-e053-a505fe0a3de9 75
New techniques for adaptive program optimization, file e3835314-e0cb-15e8-e053-a505fe0a3de9 66
Designing Robust API Monitoring Solutions, file e383532e-a880-15e8-e053-a505fe0a3de9 65
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming, file e383532e-8bdb-15e8-e053-a505fe0a3de9 63
Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts, file e383532e-a87e-15e8-e053-a505fe0a3de9 54
WEIZZ: Automatic grey-box fuzzing for structured binary formats, file e383532e-8a22-15e8-e053-a505fe0a3de9 50
Fuzzing Binaries for Memory Safety Errors with QASan, file e383532e-b12d-15e8-e053-a505fe0a3de9 47
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation, file e383532c-75de-15e8-e053-a505fe0a3de9 21
A Survey of Symbolic Execution Techniques, file e383531c-35f1-15e8-e053-a505fe0a3de9 10
The use of likely invariants as feedback for fuzzers, file e383532d-431a-15e8-e053-a505fe0a3de9 5
ROPMate: Visually Assisting the Creation of ROP-based Exploits, file e3835321-ced6-15e8-e053-a505fe0a3de9 4
Memory Models in Symbolic Execution: Key Ideas and New Thoughts, file e3835324-5edd-15e8-e053-a505fe0a3de9 3
On-stack replacement, distilled, file e383531a-f95b-15e8-e053-a505fe0a3de9 2
On-stack replacement, distilled, file e383531b-03b8-15e8-e053-a505fe0a3de9 2
Rethinking Pointer Reasoning in Symbolic Execution, file e383531c-17be-15e8-e053-a505fe0a3de9 2
Static analysis of ROP code, file e3835321-df33-15e8-e053-a505fe0a3de9 2
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed), file e3835322-d82a-15e8-e053-a505fe0a3de9 2
On the Dissection of Evasive Malware, file e3835326-c160-15e8-e053-a505fe0a3de9 2
Fuzzing Binaries for Memory Safety Errors with QASan, file e3835328-e942-15e8-e053-a505fe0a3de9 2
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization, file e383532e-82b8-15e8-e053-a505fe0a3de9 2
Where Did My Variable Go? Poking Holes in Incomplete Debug Information, file 42ed0bd4-6998-4f26-a8df-c2c558ab1727 1
Flexible On-Stack Replacement in LLVM, file e3835321-6fc8-15e8-e053-a505fe0a3de9 1
Flexible On-Stack Replacement in LLVM, file e3835321-6fc9-15e8-e053-a505fe0a3de9 1
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution, file e3835322-4d6e-15e8-e053-a505fe0a3de9 1
Rope: Covert Multi-process Malware Execution with Return-Oriented Programming, file e383532d-1da8-15e8-e053-a505fe0a3de9 1
Totale 3.756
Categoria #
all - tutte 5.477
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 5.477


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201969 0 0 0 0 0 0 0 4 3 16 25 21
2019/2020513 16 15 10 19 39 29 35 54 64 130 65 37
2020/2021952 71 62 82 49 48 75 81 72 122 126 88 76
2021/20221.151 83 98 161 161 140 80 72 79 70 56 88 63
2022/2023673 45 65 83 49 66 57 64 60 53 32 46 53
2023/2024378 71 59 103 75 70 0 0 0 0 0 0 0
Totale 3.756