default search action
Mila Dalla Preda
Person information
- affiliation: University of Verona, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro, Nicola Zannone:
Obfuscation strategies for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100717 (2024) - [j18]Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia:
Editorial: Special issue on software protection and attacks. J. Inf. Secur. Appl. 86: 103889 (2024) - [j17]Marco Campion, Mila Dalla Preda, Roberto Giacobazzi, Caterina Urban:
Monotonicity and the Precision of Program Analysis. Proc. ACM Program. Lang. 8(POPL): 1629-1662 (2024) - [j16]Mila Dalla Preda, Michele Ianni:
Exploiting number theory for dynamic software watermarking. J. Comput. Virol. Hacking Tech. 20(1): 41-51 (2024) - [e5]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i7]Mila Dalla Preda, Serge Egelman, Anna Maria Mandalari, Volker Stocker, Juan Tapiador, Narseo Vallina-Rodriguez:
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112). Dagstuhl Reports 14(3): 52-74 (2024) - [i6]Mila Dalla Preda, Niccolò Marastoni, Federica Paci:
Next Generation Vulnerability Detection with LLMs. ERCIM News 139(138) (2024) - 2023
- [j15]Michele Pasqua, Andrea Benini, Filippo Contro, Marco Crosara, Mila Dalla Preda, Mariano Ceccato:
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 200: 111653 (2023) - [j14]Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda:
Dataset Characteristics for Reliable Code Authorship Attribution. IEEE Trans. Dependable Secur. Comput. 20(1): 506-521 (2023) - [c38]Mila Dalla Preda, Francesco Masaia:
Exploring NFT Validation through Digital Watermarking. ARES 2023: 60:1-60:6 - [c37]Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone:
Towards Obfuscation of Programmable Logic Controllers. ARES 2023: 121:1-121:10 - [c36]Marco Campion, Caterina Urban, Mila Dalla Preda, Roberto Giacobazzi:
A Formal Framework to Measure the Incompleteness of Abstract Interpretations. SAS 2023: 114-138 - 2022
- [j13]Marco Campion, Mila Dalla Preda, Roberto Giacobazzi:
Partial (In)Completeness in abstract interpretation: limiting the imprecision in program analysis. Proc. ACM Program. Lang. 6(POPL): 1-31 (2022) - [c35]Marco Campion, Mila Dalla Preda, Roberto Giacobazzi:
On the Properties of Partial Completeness in Abstract Interpretation. ICTCS 2022: 79-85 - 2021
- [j12]Marco Campion, Mila Dalla Preda, Roberto Giacobazzi:
Learning metamorphic malware signatures from samples. J. Comput. Virol. Hacking Tech. 17(3): 167-183 (2021) - [j11]Niccolò Marastoni, Roberto Giacobazzi, Mila Dalla Preda:
Data augmentation and transfer learning to classify malware images in a deep learning context. J. Comput. Virol. Hacking Tech. 17(4): 279-297 (2021) - [c34]Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda:
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode. ICPC 2021: 127-137 - [d1]Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda:
Github Dataset for Authorship Attribution. IEEE DataPort, 2021 - [i5]Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda:
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode. CoRR abs/2103.09113 (2021) - 2020
- [c33]Mila Dalla Preda:
Towards a Unifying Framework for Tuning Analysis Precision by Program Transformation. Gabbrielli's Festschrift 2020: 4:1-4:22 - [c32]Michele Pasetto, Niccolò Marastoni, Mila Dalla Preda:
Revealing Similarities in Android Malware by Dissecting their Methods. EuroS&P Workshops 2020: 625-634 - [c31]Mila Dalla Preda, Roberto Giacobazzi, Niccolò Marastoni:
Formal Framework for Reasoning About the Precision of Dynamic Analysis. SAS 2020: 178-199
2010 – 2019
- 2019
- [j10]Mila Dalla Preda, Michele Pasqua:
Semantics-based software watermarking by abstract interpretation. Math. Struct. Comput. Sci. 29(2): 339-388 (2019) - [c30]Alina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley:
Adversarial Authorship Attribution in Open-Source Projects. CODASPY 2019: 291-302 - [c29]Marco Campion, Mila Dalla Preda, Roberto Giacobazzi:
Abstract Interpretation of Indexed Grammars. SAS 2019: 121-139 - [i4]Bjorn De Sutter, Christian S. Collberg, Mila Dalla Preda, Brecht Wyseur:
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331). Dagstuhl Reports 9(8): 1-25 (2019) - 2018
- [j9]Mila Dalla Preda, Isabella Mastroeni:
Characterizing a property-driven obfuscation strategy. J. Comput. Secur. 26(1): 31-69 (2018) - [c28]Niccolò Marastoni, Roberto Giacobazzi, Mila Dalla Preda:
A deep learning approach to program similarity. MASES@ASE 2018: 26-35 - 2017
- [j8]Mila Dalla Preda, Maurizio Gabbrielli, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro:
Dynamic Choreographies: Theory And Implementation. Log. Methods Comput. Sci. 13(2) (2017) - [j7]Roberto Giacobazzi, Isabella Mastroeni, Mila Dalla Preda:
Maximal incompleteness as obfuscation potency. Formal Aspects Comput. 29(1): 3-31 (2017) - [j6]Mila Dalla Preda, Federico Maggi:
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology. J. Comput. Virol. Hacking Tech. 13(3): 209-232 (2017) - [i3]Vincenzo Arceri, Mila Dalla Preda, Roberto Giacobazzi, Isabella Mastroeni:
SEA: String Executability Analysis by Abstract Interpretation. CoRR abs/1702.02406 (2017) - 2016
- [c27]Riccardo Sartea, Mila Dalla Preda, Alessandro Farinelli, Roberto Giacobazzi, Isabella Mastroeni:
Active Android malware analysis: an approach based on stochastic games. SSPREW@ACSAC 2016: 5:1-5:10 - [c26]Chengyu Zheng, Mila Dalla Preda, Jorge Granjal, Stefano Zanero, Federico Maggi:
On-chip system call tracing: A feasibility study and open prototype. CNS 2016: 73-81 - [c25]Mila Dalla Preda, Roberto Giacobazzi, Isabella Mastroeni:
Completeness in Approximate Transduction. SAS 2016: 126-146 - [c24]Mila Dalla Preda, Michele Pasqua:
Software Watermarking: A Semantics-based Approach. NSAD@SAS 2016: 71-85 - [c23]Mila Dalla Preda, Vanessa Vidali:
Abstract Similarity Analysis. NSAD@SAS 2016: 87-99 - [e4]Mila Dalla Preda, Natalia Stakhanova, Jeffrey Todd McDonald:
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016. ACM 2016, ISBN 978-1-4503-4841-6 [contents] - 2015
- [j5]Mila Dalla Preda, Maurizio Gabbrielli, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro:
Developing correct, distributed, adaptive software. Sci. Comput. Program. 97: 41-46 (2015) - [j4]Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray:
Unveiling metamorphism by abstract interpretation of code properties. Theor. Comput. Sci. 577: 74-97 (2015) - [c22]Mila Dalla Preda, Maurizio Gabbrielli, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro:
Dynamic Choreographies - Safe Runtime Updates of Distributed Applications. COORDINATION 2015: 67-82 - [c21]Mila Dalla Preda, Isabella Mastroeni:
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications. SPRO@ICSE 2015: 59-65 - [c20]Mila Dalla Preda, Roberto Giacobazzi, Arun Lakhotia, Isabella Mastroeni:
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables. POPL 2015: 329-341 - [e3]Jeffrey Todd McDonald, Mila Dalla Preda, Natalia Stakhanova:
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015. ACM 2015, ISBN 978-1-4503-3642-0 [contents] - 2014
- [c19]Mila Dalla Preda, Isabella Mastroeni, Roberto Giacobazzi:
Analyzing program dependencies for malware detection. PPREW@POPL 2014: 6:1-6:7 - [c18]Mila Dalla Preda, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro, Maurizio Gabbrielli:
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications. SLE 2014: 161-170 - [e2]Mila Dalla Preda, Jeffrey Todd McDonald:
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014. ACM 2014, ISBN 978-1-60558-637-3 [contents] - [i2]Mila Dalla Preda, Maurizio Gabbrielli, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro:
Deadlock Freedom by Construction for Distributed Adaptive Applications. CoRR abs/1407.0970 (2014) - [i1]Mila Dalla Preda, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro, Maurizio Gabbrielli:
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications. CoRR abs/1407.0975 (2014) - 2013
- [c17]Mila Dalla Preda, Isabella Mastroeni, Roberto Giacobazzi:
A Formal Framework for Property-Driven Obfuscation Strategies. FCT 2013: 133-144 - [c16]Arun Lakhotia, Mila Dalla Preda, Roberto Giacobazzi:
Fast location of similar code fragments using semantic 'juice'. PPREW@POPL 2013: 5:1-5:6 - [e1]Jeffrey Todd McDonald, Mila Dalla Preda:
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy. ACM 2013, ISBN 978-1-4503-1857-0 [contents] - 2012
- [c15]Mila Dalla Preda, Maurizio Gabbrielli, Claudio Guidi, Jacopo Mauro, Fabrizio Montesi:
Interface-Based Service Composition with Aggregation. ESOCC 2012: 48-63 - [c14]Mila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia:
Twisting Additivity in Program Obfuscation. ICISTM 2012: 336-347 - [c13]Mila Dalla Preda:
The Grand Challenge in Metamorphic Analysis. ICISTM 2012: 439-444 - [c12]Mila Dalla Preda, Maurizio Gabbrielli, Claudio Guidi, Jacopo Mauro, Fabrizio Montesi:
Service integration via target-transparent mediation. SOCA 2012: 1-5 - 2011
- [c11]Mila Dalla Preda, Cinzia Di Giusto:
Hunting Distributed Malware with the κ-Calculus. FCT 2011: 102-113 - [c10]Mila Dalla Preda, Maurizio Gabbrielli, Ivan Lanese, Jacopo Mauro, Gianluigi Zavattaro:
Graceful Interruption of Request-Response Service Interactions. ICSOC 2011: 590-600 - 2010
- [c9]Mila Dalla Preda, Roberto Giacobazzi, Saumya K. Debray, Kevin Coogan, Gregg M. Townsend:
Modelling Metamorphism by Abstract Interpretation. SAS 2010: 218-235
2000 – 2009
- 2009
- [j3]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Trading-off security and performance in barrier slicing for remote software entrusting. Autom. Softw. Eng. 16(2): 235-261 (2009) - [j2]Mila Dalla Preda, Roberto Giacobazzi:
Semantics-based code obfuscation by abstract interpretation. J. Comput. Secur. 17(6): 855-908 (2009) - [c8]Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, Anirban Majumdar:
Remote software protection by orthogonal client replacement. SAC 2009: 448-455 - 2008
- [j1]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:
A semantics-based approach to malware detection. ACM Trans. Program. Lang. Syst. 30(5): 25:1-25:54 (2008) - [c7]Mila Dalla Preda, Roberto Giacobazzi, Enrico Visentini:
Hiding Software Watermarks in Loop Structures. SAS 2008: 174-188 - 2007
- [b1]Mila Dalla Preda:
Code obfuscation and malware detection by abstract interpretation. University of Verona, Italy, 2007 - [c6]Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya K. Debray:
A semantics-based approach to malware detection. POPL 2007: 377-388 - [c5]Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S. Collberg, Paolo Tonella:
Barrier Slicing for Remote Software Trusting. SCAM 2007: 27-36 - 2006
- [c4]Mila Dalla Preda, Matias Madou, Koen De Bosschere, Roberto Giacobazzi:
Opaque Predicates Detection by Abstract Interpretation. AMAST 2006: 81-95 - 2005
- [c3]Mila Dalla Preda, Roberto Giacobazzi:
Semantic-Based Code Obfuscation by Abstract Interpretation. ICALP 2005: 1325-1336 - [c2]Mila Dalla Preda, Roberto Giacobazzi:
Control Code Obfuscation by Abstract Interpretation. SEFM 2005: 301-310 - 2004
- [c1]Mila Dalla Preda:
Completeness Refinement in Abstract Symbolic Trajectory Evaluation. SAS 2004: 38-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint