Picture of Daniele

Daniele Cono D'Elia

I'm a postdoctoral researcher in the SEASON Lab at Sapienza University of Rome and a member of the CIS Sapienza research center for Cyber Intelligence and Information Security. I'm one of the organizers of the CyberChallenge.IT initiative.

I got my PhD in 2016 under the supervision of Camil Demetrescu on adaptive program optimization techniques. In 2014 I was a visiting scholar at Purdue University working with Jan Vitek. You can find my resume here.

My research involves software security and programming languages. I play with malware, code reuse techniques, program analysis, compilers, and code optimization techniques. In my free time I'm a road cyclist and traveler.

Teaching

I enjoy supervising highly motivated students in thesis projects that tackle open research questions. If you are interested in software security topics (including, but not limited to, malware, ROP, code obfuscation, and binary analysis) and you are up for a challenge drop me a line.

Classes I taught as adjunct professor:

Some former students: Andrea Salvati (MSc, EUROSEC'19 co-author), Federico Palmaro (MSc, ASIACCS'19 co-author), Fabio Rosato (MSc, 2017 CLUSIT award for best thesis in information security in Italy).

Publications

  • SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)

    D.C. D'Elia, E. Coppa, S. Nicchi, F. Palmaro, L. Cavallaro. ACM ASIACCS 2019

  • Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution

    L. Borzacchiello, E. Coppa, D.C. D'Elia, C. Demetrescu. CSCML 2019

  • Static Analysis of ROP Code

    D.C. D'Elia, E. Coppa, A. Salvati, C. Demetrescu. ACM EUROSEC 2019

  • The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse

    P. Borrello, E. Coppa, D.C. D'Elia, C. Demetrescu. ACM SAC 2019

  • ROPMate: Visually Assisting the Creation of ROP-based Exploits

    M. Angelini, G. Blasilli, P. Borrello, E. Coppa, D.C. D'Elia, S. Ferracci, S. Lenti, G. Santucci. Best paper Award @ IEEE VizSec 2018

  • On-Stack Replacement, Distilled

    D.C. D'Elia, C. Demetrescu. ACM PLDI 2018

  • [J] A Survey of Symbolic Execution Techniques

    R. Baldoni, E. Coppa, D.C. D'Elia, C. Demetrescu, I. Finocchi. ACM Computing Surveys 2018

  • Rethinking Pointer Reasoning in Symbolic Execution

    E. Coppa, D.C. D'Elia, C. Demetrescu. IEEE/ACM ASE 2017

  • Assisting Malware Analysis with Symbolic Execution: A Case Study

    R. Baldoni, E. Coppa, D.C. D'Elia, C. Demetrescu. CSCML 2017

  • Flexible On-Stack Replacement in LLVM

    D.C. D'Elia, C. Demetrescu. IEEE/ACM CGO 2016

  • [J] Mining Hot Calling Contexts in Small Space

    D.C. D'Elia, C. Demetrescu, I. Finocchi. Software: Practice and Experience 2015

  • Ball-Larus Path Profiling Across Multiple Loop Iterations

    D.C. D'Elia, C. Demetrescu. ACM OOPSLA 2013

  • Mining Hot Calling Contexts in Small Space

    D.C. D'Elia, C. Demetrescu, I. Finocchi. ACM PLDI 2011

Contact

  • Daniele Cono D'Elia
  • delia at diag dot uniroma1 dot it
  • Dept. of Computer, Control, and Management Engineering
    Room B118
    25 Via Ariosto
    00185 Rome, Italy
  • dcdelia
  • Google Scholar

Social