default search action
Davide Balzarotti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Afiqah Azahari, Davide Balzarotti:
On the inadequacy of open-source application logs for digital forensics. Forensic Sci. Int. Digit. Investig. 49: 301750 (2024) - [c108]Antonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, Simone Aonzo:
Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware. AsiaCCS 2024 - [c107]Davide Balzarotti:
Malware Research: History, Milestones, and Open Questions. CODASPY 2024: 5-6 - [c106]Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida:
Predictive Context-sensitive Fuzzing. NDSS 2024 - [e6]Davide Balzarotti, Wenyuan Xu:
33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024. USENIX Association 2024 [contents] - [i6]Christian Scano, Giuseppe Floris, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
ModSec-Learn: Boosting ModSecurity with Machine Learning. CoRR abs/2406.13547 (2024) - 2023
- [j21]Savino Dambra, Leyla Bilge, Davide Balzarotti:
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. ACM Trans. Priv. Secur. 26(2): 16:1-16:30 (2023) - [j20]Andrea Fioraldi, Alessandro Mantovani, Dominik Christian Maier, Davide Balzarotti:
Dissecting American Fuzzy Lop: A FuzzBench Evaluation. ACM Trans. Softw. Eng. Methodol. 32(2): 52:1-52:26 (2023) - [j19]Andrea Fioraldi, Alessandro Mantovani, Dominik Christian Maier, Davide Balzarotti:
Dissecting American Fuzzy Lop - A FuzzBench Evaluation - RCR Report. ACM Trans. Softw. Eng. Methodol. 32(2): 54:1-54:4 (2023) - [c105]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CCS 2023: 60-74 - [c104]Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio:
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors. AISec@CCS 2023: 233-244 - [c103]Addison Crump, Dongjia Zhang, Syeda Mahnur Asif, Dominik Christian Maier, Andrea Fioraldi, Thorsten Holz, Davide Balzarotti:
CrabSandwich: Fuzzing Rust with Rust (Registered Report). FUZZING 2023: 39-46 - [c102]Andrea Oliveri, Matteo Dell'Amico, Davide Balzarotti:
An OS-agnostic Approach to Memory Forensics. NDSS 2023 - [c101]Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti:
Humans vs. Machines in Malware Classification. USENIX Security Symposium 2023: 1145-1162 - [c100]Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos:
Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages. USENIX Security Symposium 2023: 4157-4173 - [c99]Feras Al Kassar, Luca Compagna, Davide Balzarotti:
WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate. USENIX Security Symposium 2023: 6079-6096 - [i5]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CoRR abs/2307.14657 (2023) - [i4]Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio:
Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning. CoRR abs/2308.04964 (2023) - [i3]Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio:
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors. CoRR abs/2310.03166 (2023) - 2022
- [j18]Fabio Pagani, Davide Balzarotti:
AutoProfile: Towards Automated Profile Generation for Memory Analysis. ACM Trans. Priv. Secur. 25(1): 6:1-6:26 (2022) - [j17]Andrea Oliveri, Davide Balzarotti:
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics. ACM Trans. Priv. Secur. 25(4): 27:1-27:32 (2022) - [c98]Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti:
The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study. AsiaCCS 2022: 602-615 - [c97]Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti:
LibAFL: A Framework to Build Modular and Reusable Fuzzers. CCS 2022: 1051-1065 - [c96]Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti:
Fuzzing with Data Dependency Information. EuroS&P 2022: 286-302 - [c95]Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi:
Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. NDSS 2022 - [c94]Iskander Sánchez-Rola, Matteo Dell'Amico, Davide Balzarotti, Pierre-Antoine Vervier, Leyla Bilge:
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships. SP 2022: 1990-2004 - [c93]Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili:
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. USENIX Security Symposium 2022: 413-430 - [c92]Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti:
How Machine Learning Is Solving the Binary Function Similarity Problem. USENIX Security Symposium 2022: 2099-2116 - [c91]Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti:
When Sally Met Trackers: Web Tracking From the Users' Perspective. USENIX Security Symposium 2022: 2189-2206 - [c90]Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti:
RE-Mind: a First Look Inside the Mind of a Reverse Engineer. USENIX Security Symposium 2022: 2727-2745 - 2021
- [j16]Miguel Martín-Pérez, Ricardo J. Rodríguez, Davide Balzarotti:
Pre-processing memory dumps to improve similarity score of Windows modules. Comput. Secur. 101: 102119 (2021) - [j15]Flavio Toffalini, Andrea Oliveri, Mariano Graziano, Jianying Zhou, Davide Balzarotti:
The evidence beyond the wall: Memory forensics in SGX environments. Digit. Investig. 39: 301313 (2021) - [j14]Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:
Certificate Transparency in Google Chrome: Past, Present, and Future. IEEE Secur. Priv. 19(6): 112-118 (2021) - [c89]Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. AsiaCCS 2021: 687-701 - [c88]Davide Quarta, Michele Ianni, Aravind Machiry, Yanick Fratantonio, Eric Gustafson, Davide Balzarotti, Martina Lindorfer, Giovanni Vigna, Christopher Kruegel:
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone. Checkmate@CCS 2021: 43-57 - [c87]Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti:
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes. NDSS 2021 - [c86]Dario Nisi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Lost in the Loader: The Many Faces of the Windows PE File Format. RAID 2021: 177-192 - [c85]Andrea Possemato, Simone Aonzo, Davide Balzarotti, Yanick Fratantonio:
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization. SP 2021: 87-102 - [c84]Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti:
The Use of Likely Invariants as Feedback for Fuzzers. USENIX Security Symposium 2021: 2829-2846 - [c83]Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, Tudor Dumitras:
When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World. USENIX Security Symposium 2021: 3487-3504 - [i2]Lorenzo Maffia, Dario Nisi, Platon Kotzias, Giovanni Lagorio, Simone Aonzo, Davide Balzarotti:
Longitudinal Study of the Prevalence of Malware Evasive Techniques. CoRR abs/2112.11289 (2021) - 2020
- [c82]Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti:
The Tangled Genealogy of IoT Malware. ACSAC 2020: 1-16 - [c81]Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. NDSS 2020 - [c80]Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti:
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. NDSS 2020 - [c79]Savino Dambra, Leyla Bilge, Davide Balzarotti:
SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap. SP 2020: 1367-1383 - [c78]Iskander Sánchez-Rola, Davide Balzarotti, Christopher Kruegel, Giovanni Vigna, Igor Santos:
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web. WWW 2020: 395-406
2010 – 2019
- 2019
- [j13]Xabier Ugarte-Pedrero, Mariano Graziano, Davide Balzarotti:
A Close Look at a Daily Dataset of Malware Samples. ACM Trans. Priv. Secur. 22(1): 6:1-6:30 (2019) - [j12]Fabio Pagani, Oleksii Fedorov, Davide Balzarotti:
Introducing the Temporal Dimension to Memory Forensics. ACM Trans. Priv. Secur. 22(2): 9:1-9:21 (2019) - [c77]Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:
BakingTimer: privacy analysis of server-side request processing time. ACSAC 2019: 478-488 - [c76]Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos:
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. AsiaCCS 2019: 340-351 - [c75]Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - [c74]Fabio Pagani, Davide Balzarotti:
Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques. USENIX Security Symposium 2019: 1751-1768 - 2018
- [j11]Xiao Han, Nizar Kheir, Davide Balzarotti:
Deception Techniques in Computer Security: A Research Perspective. ACM Comput. Surv. 51(4): 80:1-80:36 (2018) - [c73]Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti:
Clock Around the Clock: Time-Based Device Fingerprinting. CCS 2018: 1502-1514 - [c72]Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti:
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. CODASPY 2018: 354-365 - [c71]Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti:
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. NDSS 2018 - [c70]Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti:
Understanding Linux Malware. IEEE Symposium on Security and Privacy 2018: 161-175 - 2017
- [c69]Xiao Han, Nizar Kheir, Davide Balzarotti:
Evaluation of Deception-Based Web Attacks Detection. MTD@CCS 2017: 65-73 - [c68]Onur Catakoglu, Marco Balduzzi, Davide Balzarotti:
Attacks landscape in the dark side of the web. SAC 2017: 1739-1746 - [c67]Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis:
A Lustrum of Malware Network Communication: Evolution and Insights. IEEE Symposium on Security and Privacy 2017: 788-804 - [c66]Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti:
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies. USENIX Security Symposium 2017: 679-694 - [c65]Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:
The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. WWW 2017: 1251-1260 - 2016
- [c64]Mariano Graziano, Davide Balzarotti, Alain Zidouemba:
ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks. AsiaCCS 2016: 47-58 - [c63]Xiao Han, Nizar Kheir, Davide Balzarotti:
PhishEye: Live Monitoring of Sandboxed Phishing Kits. CCS 2016: 1402-1413 - [c62]Mariano Graziano, Lorenzo Flore, Andrea Lanzi, Davide Balzarotti:
Subverting Operating System Properties Through Evolutionary DKOM Attacks. DIMVA 2016: 3-24 - [c61]Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas:
RAMBO: Run-Time Packer Analysis with Multiple Branch Observation. DIMVA 2016: 186-206 - [c60]Flavio Toffalini, Maurizio Abbà, Damiano Carra, Davide Balzarotti:
Google Dorks: Analysis, Creation, and New Defenses. DIMVA 2016: 255-275 - [c59]Fabio Pagani, Matteo De Astis, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Measuring the Role of Greylisting and Nolisting in Fighting Spam. DSN 2016: 562-571 - [c58]Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti:
Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. RAID 2016: 24-48 - [c57]Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow:
Uses and Abuses of Server-Side Requests. RAID 2016: 393-414 - [c56]Stefano Cristalli, Mattia Pagnozzi, Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks. USENIX Security Symposium 2016: 431-446 - [c55]Onur Catakoglu, Marco Balduzzi, Davide Balzarotti:
Automatic Extraction of Indicators of Compromise for Web Applications. WWW 2016: 333-343 - [e5]Stephen Schwab, William K. Robertson, Davide Balzarotti:
Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016. ACM 2016, ISBN 978-1-4503-4771-6 [contents] - 2015
- [j10]Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. Comput. Secur. 52: 33-50 (2015) - [j9]Davide Balzarotti, Roberto Di Pietro, Antonio Villani:
The impact of GPU-assisted malware on memory forensics: A case study. Digit. Investig. 14 Supplement 1: S16-S24 (2015) - [c54]Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti:
PIE: Parser Identification in Embedded Systems. ACSAC 2015: 251-260 - [c53]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c52]Xiao Han, Nizar Kheir, Davide Balzarotti:
The Role of Cloud Services in Malicious Software: Trends and Insights. DIMVA 2015: 187-204 - [c51]Xabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo García Bringas:
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers. IEEE Symposium on Security and Privacy 2015: 659-673 - [c50]Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri:
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services. USENIX Security Symposium 2015: 801-816 - [c49]Mariano Graziano, Davide Canali, Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence. USENIX Security Symposium 2015: 1057-1072 - 2014
- [j8]Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro, Moritz Steiner, Davide Balzarotti:
Resource monitoring for the detection of parasite P2P botnets. Comput. Networks 70: 302-311 (2014) - [j7]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon, Davide Balzarotti:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. EURASIP J. Inf. Secur. 2014: 4 (2014) - [j6]Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. ACM Trans. Inf. Syst. Secur. 16(4): 14 (2014) - [c48]Davide Canali, Leyla Bilge, Davide Balzarotti:
On the effectiveness of risk prediction based on users browsing behavior. AsiaCCS 2014: 171-182 - [c47]Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann:
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. AsiaCCS 2014: 305-316 - [c46]Jelena Isacenkova, Davide Balzarotti:
Shades of gray: a closer look at emails in the gray area. AsiaCCS 2014: 377-388 - [c45]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c44]Giancarlo Pellegrino, Davide Balzarotti:
Toward Black-Box Detection of Logic Flaws in Web Applications. NDSS 2014 - [c43]Jonas Zaddach, Luca Bruno, Aurélien Francillon, Davide Balzarotti:
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. NDSS 2014 - [c42]Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti:
A Large-Scale Analysis of the Security of Embedded Firmwares. USENIX Security Symposium 2014: 95-110 - [c41]Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon:
Through the Looking-Glass, and What Eve Found There. WOOT 2014 - [e4]Davide Balzarotti, Juan Caballero:
Proceedings of the Seventh European Workshop on System Security, EuroSec 2014, April 13, 2014, Amsterdam, The Netherlands. ACM 2014, ISBN 978-1-4503-2715-2 [contents] - 2013
- [c40]Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. ACSAC 2013: 279-288 - [c39]Davide Canali, Davide Balzarotti:
Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. NDSS 2013 - [c38]Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti:
The role of phone numbers in understanding cyber-crime schemes. PST 2013: 213-220 - [c37]Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Hypervisor Memory Forensics. RAID 2013: 21-40 - [c36]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. IEEE Symposium on Security and Privacy Workshops 2013: 143-150 - [c35]Davide Canali, Davide Balzarotti, Aurélien Francillon:
The role of web hosting providers in detecting compromised websites. WWW 2013: 177-188 - [i1]Magnus Almgren, Davide Balzarotti, Marina Papatriantafilou, Valentin Tudor:
Cybersecurity in the Smart Grid. ERCIM News 2013(92) (2013) - 2012
- [j5]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. Comput. Secur. 31(3): 344-356 (2012) - [c34]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c33]Mariano Graziano, Corrado Leita, Davide Balzarotti:
Towards network containment in malware analysis systems. ACSAC 2012: 339-348 - [c32]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c31]Davide Canali, Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
A quantitative study of accuracy in system call-based malware detection. ISSTA 2012: 122-132 - [c30]Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. NDSS 2012 - [c29]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - [c28]Marco Balduzzi, Jonas Zaddach, Davide Balzarotti, Engin Kirda, Sergio Loureiro:
A security analysis of amazon's elastic compute cloud service. SAC 2012: 1427-1434 - [c27]Alessandro Armando, Giancarlo Pellegrino, Roberto Carbone, Alessio Merlo, Davide Balzarotti:
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap. TAP@TOOLS 2012: 3-18 - [e3]Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8 [contents] - 2011
- [c26]Danesh Irani, Marco Balduzzi, Davide Balzarotti, Engin Kirda, Calton Pu:
Reverse Social Engineering Attacks in Online Social Networks. DIMVA 2011: 55-74 - [c25]Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin, Davide Balzarotti:
Operating System Interface Obfuscation and the Revealing of Hidden Operations. DIMVA 2011: 214-233 - [c24]Leyla Bilge, Andrea Lanzi, Davide Balzarotti:
Thwarting real-time dynamic unpacking. EUROSEC 2011: 5 - [c23]Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. Financial Cryptography 2011: 284-298 - [c22]Jelena Isacenkova, Davide Balzarotti:
Measurement and evaluation of a real world deployment of a challenge-response spam filter. Internet Measurement Conference 2011: 413-426 - [c21]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011 - [c20]Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. NDSS 2011 - [e2]Robin Sommer, Davide Balzarotti, Gregor Maier:
Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Lecture Notes in Computer Science 6961, Springer 2011, ISBN 978-3-642-23643-3 [contents] - 2010
- [j4]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c19]Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
G-Free: defeating return-oriented programming through gadget-less binaries. ACSAC 2010: 49-58 - [c18]Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. AsiaCCS 2010: 135-144 - [c17]Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda:
AccessMiner: using system-centric models for malware protection. CCS 2010: 399-412 - [c16]Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda:
Honeybot, Your Man in the Middle for Automated Social Engineering. LEET 2010 - [c15]Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware. NDSS 2010 - [c14]Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
Abusing Social Networks for Automated User Profiling. RAID 2010: 422-441
2000 – 2009
- 2009
- [j3]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c13]Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda:
A View on Current Malware Behaviors. LEET 2009 - [c12]Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda:
All your contacts are belong to us: automated identity theft attacks on social networks. WWW 2009: 551-560 - [e1]Engin Kirda, Somesh Jha, Davide Balzarotti:
Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Lecture Notes in Computer Science 5758, Springer 2009, ISBN 978-3-642-04341-3 [contents] - 2008
- [c11]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - [c10]Davide Balzarotti, Marco Cova, Giovanni Vigna:
ClearShot: Eavesdropping on Keyboard Input from Video. SP 2008: 170-183 - [c9]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. SP 2008: 387-401 - 2007
- [j2]Davide Balzarotti, Paolo Costa, Gian Pietro Picco:
The LighTS tuple space framework and its customization for context-aware applications. Web Intell. Agent Syst. 5(2): 215-231 (2007) - [c8]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63 - [c7]Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna:
Multi-module vulnerability analysis of web-based applications. CCS 2007: 25-35 - [c6]Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna:
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. RAID 2007: 63-86 - [c5]Matthew Van Gundy, Davide Balzarotti, Giovanni Vigna:
Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms. WOOT 2007 - 2006
- [b1]Davide Balzarotti:
Testing network intrusion detection systems. Polytechnic University of Milan, Italy, 2006 - [j1]Davide Balzarotti, Carlo Ghezzi, Mattia Monga:
Supporting Cooperative Software Processes in a Decentralized and Nomadic World. IEEE Trans. Syst. Man Cybern. Part A 36(6): 1098-1109 (2006) - [p1]Davide Balzarotti, Mattia Monga, Sabrina Sicari:
Assessing the risk of using vulnerable components. Quality of Protection 2006: 65-77 - 2005
- [c4]Gian Pietro Picco, Davide Balzarotti, Paolo Costa:
LighTS: a lightweight, customizable tuple space supporting context-aware applications. SAC 2005: 413-419 - 2004
- [c3]Giovanni Vigna, William K. Robertson, Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits. CCS 2004: 21-30 - 2002
- [c2]Davide Balzarotti, Carlo Ghezzi, Mattia Monga:
Freeing Cooperation from Servers Tyranny. NETWORKING Workshops 2002: 235-246 - [c1]Davide Balzarotti, Carlo Ghezzi, Mattia Monga:
Supporting configuration management for virtual workgroups ini a peer-to-peer setting. SEKE 2002: 507-511
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint