Follow
Lorenzo De Carli
Lorenzo De Carli
Assistant Professor, Electrical and Software Engineering, University of Calgary
Verified email at ucalgary.ca - Homepage
Title
Cited by
Cited by
Year
A general constraint-centric scheduling framework for spatial architectures
T Nowatzki, M Sartin-Tarm, L De Carli, K Sankaralingam, C Estan, ...
ACM SIGPLAN Notices 48 (6), 495-506, 2013
1162013
Cimplifier: automatically debloating containers
V Rastogi, D Davidson, L De Carli, S Jha, P McDaniel
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
1142017
Defending against package typosquatting
M Taylor, R Vaidya, D Davidson, L De Carli, V Rastogi
Network and System Security: 14th International Conference, NSS 2020 …, 2020
68*2020
Plug: Flexible lookup modules for rapid deployment of new protocols in high-speed routers
L De Carli, Y Pan, A Kumar, C Estan, K Sankaralingam
Proceedings of the ACM SIGCOMM 2009 conference on Data communication, 207-218, 2009
672009
Beyond pattern matching: A concurrency model for stateful deep packet inspection
L De Carli, R Sommer, S Jha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
492014
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini
Applied Cryptography and Network Security: 18th International Conference …, 2020
362020
Security issues in language-based software ecosystems
RK Vaidya, L De Carli, D Davidson, V Rastogi
arXiv preprint arXiv:1903.02613, 2019
362019
Wolf at the door: Preventing install-time attacks in npm with latch
E Wyss, A Wittman, D Davidson, L De Carli
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
352022
Botnet protocol inference in the presence of encrypted traffic
L De Carli, R Torres, G Modelo-Howard, A Tongaonkar, S Jha
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
352017
Evading behavioral classifiers: a comprehensive analysis on evading ransomware detection techniques
F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini
Neural Computing and Applications 34 (14), 12077-12096, 2022
312022
Hilti: An abstract execution environment for deep, stateful network traffic analysis
R Sommer, M Vallentin, L De Carli, V Paxson
Proceedings of the 2014 Conference on Internet Measurement Conference, 461-474, 2014
292014
EnCoD: Distinguishing Compressed and Encrypted File Fragments
F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini
Network and System Security: 14th International Conference, NSS 2020 …, 2020
262020
What the fork? finding hidden code clones in npm
E Wyss, L De Carli, D Davidson
Proceedings of the 44th International Conference on Software Engineering …, 2022
242022
Systems and methods for reverse-engineering malware protocols
RT Guerra, G Modelo-Howard, A Tongaonkar, L De Carli, S Jha
US Patent 10,050,982, 2018
242018
Increasing performances of TCP data transfers through multiple parallel connections
A Baldini, L De Carli, F Risso
2009 IEEE Symposium on Computers and Communications, 630-636, 2009
222009
Deep packet inspection with DFA-trees and parametrized language overapproximation
D Luchaup, L De Carli, S Jha, E Bach
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 531-539, 2014
202014
Reliable detection of compressed and encrypted data
F De Gaspari, D Hitaj, G Pagnotta, L De Carli, LV Mancini
Neural Computing and Applications 34 (22), 20379-20393, 2022
192022
An analysis of first-party cookie exfiltration due to cname redirections
T Ren, A Wittman, L De Carli, D Davidson
Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021
142021
Minerva: A file-based ransomware detector
D Hitaj, G Pagnotta, F De Gaspari, L De Carli, LV Mancini
arXiv preprint arXiv:2301.11050, 2023
122023
On the data privacy, security, and risk postures of IoT mobile companion Apps
S Neupane, F Tazi, U Paudel, FV Baez, M Adamjee, L De Carli, S Das, ...
IFIP Annual Conference on Data and Applications Security and Privacy, 162-182, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20