default search action
Giuseppe Petracca
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i7]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - 2021
- [j2]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Commun. Surv. Tutorials 23(2): 1125-1159 (2021) - [c16]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - 2020
- [i6]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020)
2010 – 2019
- 2019
- [c15]Ahmad Atamli, Giuseppe Petracca, Jon Crowcroft:
IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems. ARES 2019: 45:1-45:6 - [c14]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - 2018
- [i5]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs/1802.02041 (2018) - [i4]Giuseppe Petracca, Jens Grossklags, Patrick D. McDaniel, Trent Jaeger:
Regulating Access to System Sensors in Cooperating Programs. CoRR abs/1808.05579 (2018) - 2017
- [j1]Ahmad Atamli-Reineh, Andrew Paverd, Giuseppe Petracca, Andrew P. Martin:
A framework for application partitioning using trusted execution environments. Concurr. Comput. Pract. Exp. 29(23) (2017) - [c13]Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. SACMAT 2017: 31-42 - [c12]Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. USENIX Security Symposium 2017: 379-396 - 2016
- [c11]Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger:
Pileus: protecting user resources from vulnerable cloud services. ACSAC 2016: 52-64 - [c10]Ahmad Atamli-Reineh, Ravishankar Borgaonkar, Ranjbar A. Balisane, Giuseppe Petracca, Andrew P. Martin:
Analysis of Trusted Execution Environment usage in Samsung KNOX. SysTEX@Middleware 2016: 7:1-7:6 - [c9]Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. MILCOM 2016: 259-264 - [i3]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. CoRR abs/1604.00320 (2016) - [i2]Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
Aware: Controlling App Access to I/O Devices on Mobile Platforms. CoRR abs/1604.02171 (2016) - [i1]Ahmad Atamli-Reineh, Giuseppe Petracca, Janne Uusilehto, Andrew P. Martin:
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices. CoRR abs/1606.02995 (2016) - 2015
- [c8]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, Joshua Schiffman:
Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services. CLOUD 2015: 253-260 - [c7]Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. ACSAC 2015: 181-190 - 2014
- [c6]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger:
Inevitable Failure: The Flawed Trust Assumption in the Cloud. CCSW 2014: 141-150 - [c5]Anna Cinzia Squicciarini, Giuseppe Petracca, William G. Horne, Aurnob Nath:
Situational awareness through reasoning on network incidents. CODASPY 2014: 111-122 - 2013
- [c4]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. CODASPY 2013: 365-376 - 2012
- [c3]Giuseppe Petracca, Anna Cinzia Squicciarini, William G. Horne, Marco Casassa Mont:
ReasONets: a fuzzy-based approach for reasoning on network incidents. CCS 2012: 1010-1012 - [c2]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data management for self-protecting objects in cloud computing systems. CNSM 2012: 140-144 - [c1]Anna Cinzia Squicciarini, William McGill, Giuseppe Petracca, Shuo Huang:
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach. POLICY 2012: 45-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint