What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Domenico Cotroneo
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
Generative AI in Cybersecurity: Generating Offensive Code from Natural Language.
Pietro Liguori
Roberto Natella
Domenico Cotroneo
2025
conf/dsn
Securing AI Code Generation Through Automated Pattern-Based Patching.
Francesco Altiero
Domenico Cotroneo
Roberta De Luca
Pietro Liguori
2024
conf/dsn
Neural Fault Injection: Generating Software Faults from Natural Language.
Domenico Cotroneo
Pietro Liguori
2023
conf/dsn
IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing.
Carmine Cesarano
Marcello Cinque
Domenico Cotroneo
Luigi De Simone
Giorgio Farina
2021
journals/compsec
Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification.
Domenico Cotroneo
Luigi De Simone
Roberto Natella
2020
conf/dsn
ProFIPy: Programmable Software Fault Injection as-a-Service.
Domenico Cotroneo
Luigi De Simone
Pietro Liguori
Roberto Natella
2019
conf/dsn
Towards Cognitive Security Defense from Data.
Marcello Cinque
Domenico Cotroneo
Antonio Pecchia
2018
conf/dsn
Towards Lightweight Temporal and Fault Isolation in Mixed-Criticality Systems with Real-Time Containers.
Marcello Cinque
Domenico Cotroneo
2015
conf/dsn
Impact of Malfunction on the Energy Efficiency of Batch Processing Systems.
Marcello Cinque
Domenico Cotroneo
Flavio Frattini
Stefano Russo
2015
conf/dsn
Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues.
Nuno Silva
Marco Vieira
Dario Ricci
Domenico Cotroneo
2014
conf/dsn
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study.
Marcello Cinque
Domenico Cotroneo
Raffaele Della Corte
Antonio Pecchia
2013
conf/dsn
Automatic collection of failure data from the iOS platform.
Marcello Cinque
Domenico Cotroneo
Carlos Rodríguez-Domínguez
José Luis Garrido
2013
conf/dsn
Towards secure monitoring and control systems: Diversify!
Domenico Cotroneo
Antonio Pecchia
Stefano Russo
2012
conf/dsn
Assessing time coalescence techniques for the analysis of supercomputer logs.
Catello Di Martino
Marcello Cinque
Domenico Cotroneo
2011
conf/dsn
Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Antonio Pecchia
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
5th International workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011.
Domenico Cotroneo
Vincenzo De Florio
2011
conf/dsn
5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011.
Domenico Cotroneo
Vincenzo De Florio
2010
conf/dsn
Representativeness analysis of injected software faults in complex software.
Roberto Natella
Domenico Cotroneo
João Durães
Henrique Madeira
2010
conf/dsn
Assessing and improving the effectiveness of logs for the analysis of software faults.
Marcello Cinque
Domenico Cotroneo
Roberto Natella
Antonio Pecchia
2010
conf/dsn
Adaptive monitoring in microkernel OSs.
Domenico Cotroneo
Domenico Di Leo
Roberto Natella
2007
conf/dsn
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Marcello Cinque
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2006
conf/dsn
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks.
Marcello Cinque
Domenico Cotroneo
Stefano Russo
Coauthors
Antonio Pecchia
(5)
Carlos Rodríguez-Domínguez
(1)
Carmine Cesarano
(1)
Catello Di Martino
(1)
Dario Ricci
(1)
Domenico Cotroneo
(22)
Domenico Di Leo
(1)
Flavio Frattini
(1)
Francesco Altiero
(1)
Giorgio Farina
(1)
Henrique Madeira
(1)
João Durães
(1)
José Luis Garrido
(1)
Luigi De Simone
(3)
Marcello Cinque
(10)
Marco Vieira
(1)
Nuno Silva
(1)
Pietro Liguori
(4)
Raffaele Della Corte
(1)
Ravishankar K. Iyer
(2)
Roberta De Luca
(1)
Roberto Natella
(6)
Stefano Russo
(3)
Vincenzo De Florio
(2)
Zbigniew Kalbarczyk
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to