default search action
Lorenzo Cavallaro
Person information
- affiliation: University College London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro, Jorge Blasco Alís:
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets. ACM Comput. Surv. 56(8): 212:1-212:36 (2024) - [c57]Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana:
Exploiting Code Symmetries for Learning Program Semantics. ICML 2024 - [c56]Aakanksha Saha, Jorge Blasco, Lorenzo Cavallaro, Martina Lindorfer:
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files. RAID 2024: 114-129 - [c55]Ilias Tsingenopoulos, Jacopo Cortellazzi, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem Space. RAID 2024: 130-146 - [c54]Giulio De Pasquale, Ilya Grishchenko, Riccardo Iesari, Gabriel Pizarro, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna:
ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning. USENIX Security Symposium 2024 - [i23]Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version). CoRR abs/2402.01359 (2024) - [i22]Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang:
Unraveling the Key of Machine Learning Solutions for Android Malware Detection. CoRR abs/2402.02953 (2024) - [i21]Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bosanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro:
How to Train your Antivirus: RL-based Hardening through the Problem-Space. CoRR abs/2402.19027 (2024) - [i20]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - 2023
- [j10]Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, Fabio Pierazzi:
Are Machine Learning Models for Malware Detection Ready for Prime Time? IEEE Secur. Priv. 21(2): 53-56 (2023) - [j9]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Lessons Learned on Machine Learning for Computer Security. IEEE Secur. Priv. 21(5): 72-77 (2023) - [c53]Theo Chow, Zeliang Kan, Lorenz Linhardt, Lorenzo Cavallaro, Daniel Arp, Fabio Pierazzi:
Drift Forensics of Malware Classifiers. AISec@CCS 2023: 197-207 - [c52]Shae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi:
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning. CCS 2023: 3561-3563 - [c51]Feng Lin, Kaiqiang Fu, Hao Luo, Ziyue Zhan, Zhibo Wang, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Cross-Modal and Multi-Attribute Face Recognition: A Benchmark. ACM Multimedia 2023: 271-279 - [c50]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. ACM Multimedia 2023: 7131-7142 - [c49]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. ACM Multimedia 2023: 8035-8046 - [c48]Giulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro:
ROPfuscator: Robust Obfuscation with ROP. SP (Workshops) 2023: 1-10 - [c47]Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors. SP (Workshops) 2023: 21-28 - [c46]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. SP 2023: 719-736 - [i19]Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais:
Do you still need a manual smart contract audit? CoRR abs/2306.12338 (2023) - [i18]Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana:
Symmetry-Preserving Program Representations for Learning Code Semantics. CoRR abs/2308.03312 (2023) - [i17]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. CoRR abs/2309.09526 (2023) - [i16]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. CoRR abs/2309.11131 (2023) - [i15]Ilias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen:
Adversarial Markov Games: On Adaptive Decision-Based Attacks and Defenses. CoRR abs/2312.13435 (2023) - 2022
- [c45]Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro:
Designing a Provenance Analysis for SGX Enclaves. ACSAC 2022: 102-116 - [c44]Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. SP 2022: 805-823 - [c43]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Dos and Don'ts of Machine Learning in Computer Security. USENIX Security Symposium 2022: 3971-3988 - [e9]Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto:
Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13358, Springer 2022, ISBN 978-3-031-09483-5 [contents] - [i14]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. CoRR abs/2202.05470 (2022) - [i13]Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro:
Designing a Provenance Analysis for SGX Enclaves. CoRR abs/2206.07418 (2022) - 2021
- [j8]Matteo Laffranchi, Stefano D'Angella, Christian Vassallo, Chiara Piezzo, Michele Canepa, Samuele De Giuseppe, Mirco Di Salvo, Antonio Succi, Samuele Cappa, Giulio Cerruti, Silvia Scarpetta, Lorenzo Cavallaro, Nicoló Boccardo, Maria Laura D'Angelo, Claudia Marchese, Jody A. Saglia, Eleonora Guanziroli, Giacinto Barresi, Marianna Semprini, Simone Traverso, Stefano Maludrottu, Franco Molteni, Rinaldo Sacchetti, Emanuele Gruppioni, Lorenzo De Michieli:
User-Centered Design and Development of the Modular TWIN Lower Limb Exoskeleton. Frontiers Neurorobotics 15: 709731 (2021) - [c42]Giuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, Lorenzo Cavallaro:
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection. AISec@CCS 2021: 111-122 - [c41]Zeliang Kan, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Investigating Labelless Drift Adaptation for Malware Detection. AISec@CCS 2021: 123-134 - [e8]Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings. Lecture Notes in Computer Science 12756, Springer 2021, ISBN 978-3-030-80824-2 [contents] - [i12]Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro:
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets. CoRR abs/2101.06124 (2021) - [i11]Raphael Labaca Castro, Luis Muñoz-González, Feargus Pendlebury, Gabi Dreo Rodosek, Fabio Pierazzi, Lorenzo Cavallaro:
Universal Adversarial Perturbations for Malware. CoRR abs/2102.06747 (2021) - 2020
- [j7]Daniele Cono D'Elia, Emilio Coppa, Federico Palmaro, Lorenzo Cavallaro:
On the Dissection of Evasive Malware. IEEE Trans. Inf. Forensics Secur. 15: 2750-2765 (2020) - [c40]James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder:
Probabilistic Naming of Functions in Stripped Binaries. ACSAC 2020: 373-385 - [c39]Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro:
Intriguing Properties of Adversarial ML Attacks in the Problem Space. SP 2020: 1332-1349 - [e7]Lorenzo Cavallaro, Andrea Lanzi:
Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020. ACM 2020, ISBN 978-1-4503-7523-8 [contents] - [i10]Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending Transcend: Revisiting Malware Classification with Conformal Evaluation. CoRR abs/2010.03856 (2020) - [i9]Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Dos and Don'ts of Machine Learning in Computer Security. CoRR abs/2010.09470 (2020) - [i8]Fukutomo Nakanishi, Giulio De Pasquale, Daniele Ferla, Lorenzo Cavallaro:
Intertwining ROP Gadgets and Opaque Predicates for Robust Obfuscation. CoRR abs/2012.09163 (2020)
2010 – 2019
- 2019
- [c38]Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro:
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). AsiaCCS 2019: 15-27 - [c37]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. USENIX Security Symposium 2019: 729-746 - [e6]Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6747-9 [contents] - [e5]Lorenzo Cavallaro, Johannes Kinder, Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6833-9 [contents] - [e4]Lorenzo Cavallaro, Johannes Kinder, Thorsten Holz:
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6831-5 [contents] - [e3]Lorenzo Cavallaro, Johannes Kinder, Josep Domingo-Ferrer:
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6830-8 [contents] - [i7]Fabio Pierazzi, Feargus Pendlebury, Jacopo Cortellazzi, Lorenzo Cavallaro:
Intriguing Properties of Adversarial ML Attacks in the Problem Space. CoRR abs/1911.02142 (2019) - [i6]Simon Bell, Kenny Paterson, Lorenzo Cavallaro:
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. CoRR abs/1912.02520 (2019) - 2018
- [j6]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". Future Gener. Comput. Syst. 80: 537-545 (2018) - [j5]Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García-Teodoro, José Camacho, Lorenzo Cavallaro:
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. IET Inf. Secur. 12(5): 404-413 (2018) - [c36]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
Enabling Fair ML Evaluations for Security. CCS 2018: 2264-2266 - [c35]Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. RAID 2018: 25-46 - [i5]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. CoRR abs/1807.07838 (2018) - 2017
- [j4]Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro:
The Evolution of Android Malware and Android Analysis Techniques. ACM Comput. Surv. 49(4): 76:1-76:41 (2017) - [j3]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Trans. Inf. Forensics Secur. 12(6): 1269-1284 (2017) - [c34]Dusan Repel, Johannes Kinder, Lorenzo Cavallaro:
Modular Synthesis of Heap Exploits. PLAS@CCS 2017: 25-35 - [c33]Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. CODASPY 2017: 309-320 - [c32]Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, David Lo, Lorenzo Cavallaro:
Understanding Android app piggybacking. ICSE (Companion Volume) 2017: 359-361 - [c31]Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, Lorenzo Cavallaro:
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware. MSR 2017: 425-435 - [c30]Gregory J. Duck, Roland H. C. Yap, Lorenzo Cavallaro:
Stack Bounds Protection with Low Fat Pointers. NDSS 2017 - [c29]Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, Lorenzo Cavallaro:
Transcend: Detecting Concept Drift in Malware Classification Models. USENIX Security Symposium 2017: 625-642 - [c28]James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder:
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection. WOOT 2017 - [c27]Gibson Mba, Jeremiah Onaolapo, Gianluca Stringhini, Lorenzo Cavallaro:
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable. WWW (Companion Volume) 2017: 1301-1310 - [i4]Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. CoRR abs/1709.05690 (2017) - 2016
- [j2]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
You can't touch this: Consumer-centric android application repackaging detection. Future Gener. Comput. Syst. 65: 1-9 (2016) - [c26]Amit Deo, Santanu Kumar Dash, Guillermo Suarez-Tangil, Volodya Vovk, Lorenzo Cavallaro:
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection. AISec@CCS 2016: 71-82 - [c25]Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin J. Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder, Lorenzo Cavallaro:
DroidScribe: Classifying Android Malware Based on Runtime Behavior. IEEE Symposium on Security and Privacy Workshops 2016: 252-261 - [e2]David Aspinall, Lorenzo Cavallaro, Mohamed Nassim Seghir, Melanie Volkamer:
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016. CEUR Workshop Proceedings 1575, CEUR-WS.org 2016 [contents] - 2015
- [c24]Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro:
CopperDroid: Automatic Reconstruction of Android Malware Behaviors. NDSS 2015 - [c23]Giovanni Cherubin, Ilia Nouretdinov, Alexander Gammerman, Roberto Jordaney, Zhi Wang, Davide Papini, Lorenzo Cavallaro:
Conformal Clustering and Its Application to Botnet Traffic. SLDS 2015: 313-322 - 2014
- [c22]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Phoenix: DGA-Based Botnet Tracking and Intelligence. DIMVA 2014: 192-211 - [i3]Andrea Gianazza, Federico Maggi, Aristide Fattori, Lorenzo Cavallaro, Stefano Zanero:
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications. CoRR abs/1402.4826 (2014) - 2013
- [c21]Cristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum:
Practical automated vulnerability monitoring using program state invariants. DSN 2013: 1-12 - [e1]Lorenzo Cavallaro, Dieter Gollmann:
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Lecture Notes in Computer Science 7886, Springer 2013, ISBN 978-3-642-38529-2 [contents] - [i2]Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero:
Tracking and Characterizing Botnets Using Automatically Generated Domains. CoRR abs/1311.5612 (2013) - 2012
- [c20]Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi:
When hardware meets software: a bulletproof solution to forensic memory acquisition. ACSAC 2012: 79-88 - [c19]Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos:
Memory Errors: The Past, the Present, and the Future. RAID 2012: 86-106 - [i1]Srdjan Matic, Aristide Fattori, Danilo Bruschi, Lorenzo Cavallaro:
Peering into the Muddy Waters of Pastebin. ERCIM News 2012(90) (2012) - 2011
- [c18]Christian Rossow, Christian J. Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten van Steen, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. BADGERS@EuroSys 2011: 78-88 - [c17]Herbert Bos, Lorenzo Cavallaro, Andrew S. Tanenbaum:
Systems Security at VU University Amsterdam. SysSec@DIMVA 2011: 111-114 - [c16]Lorenzo Cavallaro, R. Sekar:
Taint-Enhanced Anomaly Detection. ICISS 2011: 160-174 - 2010
- [j1]Andrew S. Tanenbaum, Raja Appuswamy, Herbert Bos, Lorenzo Cavallaro, Cristiano Giuffrida, Tomás Hrubý, Jorrit N. Herder, Erik van der Kouwe, David C. van Moolenbroek:
MINIX 3: Status Report and Current Research. login Usenix Mag. 35(3) (2010) - [c15]Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. AsiaCCS 2010: 145-156 - [c14]Antonio Nappa, Aristide Fattori, Marco Balduzzi, Matteo Dell'Amico, Lorenzo Cavallaro:
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype. DIMVA 2010: 81-100 - [c13]Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna:
Organizing Large Scale Hacking Competitions. DIMVA 2010: 132-152 - [c12]Cristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum:
We Crashed, Now What? HotDep 2010 - [c11]Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro:
Live and Trustworthy Forensic Analysis of Commodity Production Systems. RAID 2010: 297-316
2000 – 2009
- 2009
- [c10]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - 2008
- [c9]Lorenzo Cavallaro, Prateek Saxena, R. Sekar:
On the Limits of Information Flow Techniques for Malware Analysis and Containment. DIMVA 2008: 143-163 - [c8]Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna:
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. ICISS 2008: 203-220 - [c7]Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga:
LISABETH: automated content-based signature generator for zero-day polymorphic worms. SESS 2008: 41-48 - [c6]Lorenzo Cavallaro, R. Sekar:
Anomalous Taint Detection. RAID 2008: 417-418 - 2007
- [c5]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. DIMVA 2007: 213-230 - [c4]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. IPCCC 2007: 418-425 - [c3]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi:
Diversified Process Replicæ for Defeating Memory Error Exploits. IPCCC 2007: 434-441 - 2005
- [c2]Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga:
Replay Attack in TCG Specification and Solution. ACSAC 2005: 127-137 - 2000
- [c1]Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti:
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. ACSAC 2000: 188-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint