Следене
Lorenzo Cavallaro
Заглавие
Позовавания
Позовавания
Година
Your botnet is my botnet: Analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9252009
Copperdroid: Automatic reconstruction of android malware behaviors
K Tam, A Fattori, S Khan, L Cavallaro
NDSS Symposium 2015, 1-15, 2015
4492015
The Evolution of Android Malware and Android Analysis Techniques
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro
ACM Computing Surveys (CSUR) 49 (4), 76, 2017
3792017
A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors
A Reina, A Fattori, L Cavallaro
EuroSec, April, 2013
2722013
Phoenix: DGA-based botnet tracking and intelligence
S Schiavoni, F Maggi, L Cavallaro, S Zanero
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
2592014
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th {USENIX} Security Symposium ({USENIX} Security 19), 729-746, 2019
2562019
Transcend: Detecting Concept Drift in Malware Classification Models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
USENIX Security Symposium, 2017
2352017
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
ACM Conference on Data and Application Security and Privacy (CODASPY), 2017
2292017
Memory errors: The past, the present, and the future
V Van der Veen, N Dutt-Sharma, L Cavallaro, H Bos
Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012
2102012
On the limits of information flow techniques for malware analysis and containment
L Cavallaro, P Saxena, R Sekar
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
2082008
DroidScribe: Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Security and Privacy Workshops (SPW), 2016 IEEE, 252-261, 2016
2032016
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
L Li, D Li, TF Bissyandé, J Klein, Y Le Traon, D Lo, L Cavallaro
IEEE Transactions on Information Forensics and Security 12 (6), 1269-1284, 2017
1772017
Intriguing Properties of Adversarial ML Attacks in the Problem Space
F Pierazzi, F Pendlebury, J Cortellazzi, L Cavallaro
2020 IEEE Symposium on Security and Privacy (SP), 1332-1349, 2020
1492020
Sandnet: Network traffic analysis of malicious software
C Rossow, CJ Dietrich, H Bos, L Cavallaro, M van Steen, FC Freiling, ...
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
1302011
PAriCheck: an efficient pointer arithmetic checker for C programs
Y Younan, P Philippaerts, L Cavallaro, R Sekar, F Piessens, W Joosen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1252010
Stack Bounds Protection with Low Fat Pointers
GJ Duck, RHC Yap, L Cavallaro
NDSS, 2017
942017
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
SKDLC Médéric Hurier, Tegawendé Bissyandé, Yves Le Traon, Jacques Klein ...
14th International Conference on Mining Software Repositories, 2017
89*2017
Dos and don'ts of machine learning in computer security
D Arp, E Quiring, F Pendlebury, A Warnecke, F Pierazzi, C Wressnegger, ...
arXiv preprint arXiv:2010.09470, 2020
842020
Live and trustworthy forensic analysis of commodity production systems
L Martignoni, A Fattori, R Paleari, L Cavallaro
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
772010
Live and trustworthy forensic analysis of commodity production systems
R PALEARI, A FATTORI, L MARTIGNONI, L CAVALLARO
Recent advances in intrusion detection: 13th international symposium, RAID …, 2010
77*2010
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20