Address | Dipartimento di Informatica e Comunicazione Università degli Studi di Milano Via Comelico 39/41 20135 Milano (IT) |
---|---|
Phone | +39 0250316362 |
![]() | |
GPG Key | 0x92E1D912 (fingerprint: 81A1 A9CE 14CE 443F 6D68 54E4 827C 53C7 92E1 D912) To retrieve it with GPG: "gpg --keyserver keys.gnupg.net --recv-key 92E1D912" |
I got my M.Sc. degree in Computer Science on October 10, 2006 at the Università degli Studi di Milano Bicocca (University of Milan Bicocca, Italy) with a final grade of 103/110.
The work I did for my M.Sc. thesis is titled "Study and Implementation of an Anomaly Based Network Intrusion Detection System" (available in Italian language only).
-
"Testing system virtual machines"In the Proceedings of the 2010 International Symposium on Testing and Analysis (ISSTA), Trento, Italy, July 12-16, 2010.
-
"N-version disassembly: differential testing of x86 disassemblers"In the Proceedings of the 2010 International Symposium on Testing and Analysis (ISSTA), Trento, Italy, July 12-16, 2010.
-
"Surgically returning to randomized lib(c)"In the Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, December 7-11, 2009.
-
"A fistful of red-pills: How to automatically generate procedures to detect CPU emulators"In the Proceedings of the 3rd USENIX Workshop on Offensive Technologies (WOOT), Montreal, Canada, August 10, 2009.
-
"Testing CPU emulators"In the Proceedings of the 2009 International Symposium on Testing and Analysis (ISSTA), Chicago, Illinois, USA, July 19-23, 2009.
KEmuFuzzer
KEmuFuzzer is protocol-specific fuzzer for system virtual machines. KEmuFuzzer generates floppy images to boot a virtual machine and to execute a specific test-case. The same test-case is executed also in an oracle, based on hardware-assisted virtualization. The states obtained are compared to detect defects in the virtual machine. Test-cases are generated using a special compiler that applies certain mutations before compiling.The source code of the project is released under the GPLv3 license and is available online on KEmuFuzzer homepage.
KEmuFuzzer is developed by Lorenzo Martignoni, Roberto Paleari, and Giampaolo Fresi Roglia
EmuFuzzer
EmuFuzzer is a fuzzer for CPU emulators. EmuFuzzer "stresses" a CPU emulator with specially crafted test-cases, representing registers and memory configurations, to verify whether the CPU is properly emulated or not. EmuFuzzer detects improper behaviours of the emulator by running the same test-case concurrently on the emulated and on the physical CPUs and by comparing the state of the two after the execution. Differences in the state testify defects in the code of the emulator.Currently EmuFuzzer supports the following CPU emulators: For more details see the paper Testing CPU emulators.
EmuFuzzer is developed by Lorenzo Martignoni, Roberto Paleari, and Giampaolo Fresi Roglia
-
Teacher for the course "Security Attacks"
at CFP Vigorelli, 2009, Milan, Italy.
[web site] -
Teacher for the course "Information Security"
at CFP Vigorelli, 2009, Milan, Italy.
[web site] -
Teacher for the course "Security Attacks"
at CFP Vigorelli, 2008, Milan, Italy.
-
Teacher for the course "Information Security"
at CFP Vigorelli, 2008, Milan, Italy.
-
Teacher for the course "Information Security"
at CFP Vigorelli, 2007, Milan, Italy.