default search action
Antonio Bianchi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Abdullah Imran, Antonio Bianchi:
Automated Detection of Cryptographic Inconsistencies in Android's Keymaster Implementations. MobiSys 2024: 385-397 - [c53]Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. SP 2024: 2328-2347 - [c52]Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik:
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. SP 2024: 2404-2421 - [c51]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. SP 2024: 2847-228066 - [c50]Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Jason Tong, Antonio Bianchi, Z. Berkay Celik:
ATTention Please! An Investigation of the App Tracking Transparency Permission. USENIX Security Symposium 2024 - [c49]Jianliang Wu, Patrick Traynor, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. USENIX Security Symposium 2024 - [c48]Muqi Zou, Arslan Khan, Ruoyu Wu, Han Gao, Antonio Bianchi, Dave (Jing) Tian:
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation. USENIX Security Symposium 2024 - [i4]Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik:
Rethinking How to Evaluate Language Model Jailbreak. CoRR abs/2404.06407 (2024) - [i3]Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Antonio Bianchi, Z. Berkay Celik:
Enhancing LLM-based Autonomous Driving Agents to Mitigate Perception Attacks. CoRR abs/2409.14488 (2024) - 2023
- [c47]Hammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, Rishab Nithyanand:
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms. CoNEXT (Companion) 2023: 37-43 - [c46]Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. EuroS&P 2023: 472-488 - [c45]Muhammad Ibrahim, Andrea Continella, Antonio Bianchi:
AoT - Attack on Things: A security analysis of IoT firmware updates. EuroS&P 2023: 1047-1064 - [c44]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. ICSE 2023: 1381-1392 - [c43]Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier, Antonio Bianchi, Mathias Payer:
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities. ESEC/SIGSOFT FSE 2023: 1586-1597 - [c42]Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik:
LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality. USENIX Security Symposium 2023: 877-894 - [c41]Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi:
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles. USENIX Security Symposium 2023: 2957-2974 - [c40]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PatchVerif: Discovering Faulty Patches in Robotic Vehicles. USENIX Security Symposium 2023: 3011-3028 - [c39]Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian:
Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery. USENIX Security Symposium 2023: 5845-5861 - [c38]Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry:
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. USENIX Security Symposium 2023: 6983-7000 - [i2]Priyanka Bose, Dipanjan Das, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Columbus: Android App Testing Through Systematic Callback Exploration. CoRR abs/2302.09116 (2023) - [i1]Hammas Bin Tanveer, Mike Puchol, Rachee Singh, Antonio Bianchi, Rishab Nithyanand:
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms. CoRR abs/2307.00402 (2023) - 2022
- [c37]Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. ACSAC 2022: 388-399 - [c36]Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. AsiaCCS 2022: 534-545 - [c35]Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. SP 2022: 1826-1844 - [c34]Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. SP 2022: 2212-2229 - [c33]Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. SP 2022: 2285-2303 - [c32]Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi:
SARA: Secure Android Remote Authorization. USENIX Security Symposium 2022: 1561-1578 - [c31]Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:
DnD: A Cross-Architecture Deep Neural Network Decompiler. USENIX Security Symposium 2022: 2135-2152 - 2021
- [c30]Onur Zungur, Antonio Bianchi, Gianluca Stringhini, Manuel Egele:
AppJitsu: Investigating the Resiliency of Android Applications. EuroS&P 2021: 457-471 - [c29]Muhammad Ibrahim, Abdullah Imran, Antonio Bianchi:
SafetyNOT: on the usage of the SafetyNet attestation API in Android. MobiSys 2021: 150-162 - [c28]Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. NDSS 2021 - [c27]Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi:
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. NDSS 2021 - [c26]Michael Reeves, Dave Jing Tian, Antonio Bianchi, Z. Berkay Celik:
Towards Improving Container Security by Preventing Runtime Escapes. SecDev 2021: 38-46 - [c25]Nilo Redini, Andrea Continella, Dipanjan Das, Giulio De Pasquale, Noah Spahn, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices. SP 2021: 484-500 - [c24]Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, Dave (Jing) Tian:
M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium 2021: 285-302 - [c23]Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. USENIX Security Symposium 2021: 339-356 - 2020
- [c22]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [c21]Dario Nisi, Antonio Bianchi, Yanick Fratantonio:
Exploring Syscall-Based Semantics Reconstruction of Android Applications. RAID 2019: 517-531 - 2018
- [b1]Antonio Bianchi:
Identifying and Mitigating Trust Violations in the Mobile Ecosystem. University of California, Santa Barbara, USA, 2018 - [j1]Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang, Giovanni Vigna:
Mechanical Phish: Resilient Autonomous Hacking. IEEE Secur. Priv. 16(2): 12-22 (2018) - [c20]Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. NDSS 2018 - [c19]Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. USENIX Security Symposium 2018: 99-116 - 2017
- [c18]Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ACSAC 2017: 16-27 - [c17]Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. NDSS 2017 - [c16]Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna:
Ramblr: Making Reassembly Great Again. NDSS 2017 - [c15]Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
BootStomp: On the Security of Bootloaders in Mobile Devices. USENIX Security Symposium 2017: 781-798 - 2016
- [c14]Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino:
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. NDSS 2016 - [c13]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - 2015
- [c12]Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna:
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. ACSAC 2015: 71-80 - [c11]Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android. SPSM@CCS 2015: 27-38 - [c10]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c9]Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - [c8]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications (invited talk). DeMobile@SIGSOFT FSE 2015: 33-34 - [c7]Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
CLAPP: characterizing loops in Android applications. ESEC/SIGSOFT FSE 2015: 687-697 - [c6]Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
What the App is That? Deception and Countermeasures in the Android User Interface. IEEE Symposium on Security and Privacy 2015: 931-948 - 2014
- [c5]Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. NDSS 2014 - 2012
- [c4]Antonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna:
Blacksheep: detecting compromised hosts in homogeneous crowds. CCS 2012: 341-352 - 2010
- [c3]Thimoty Barbieri, Piero Fraternali, Antonio Bianchi, Clarissa Tacchella:
Autonomamente: Using Goal Attainment Scales to Evaluate the Impact of a Multimodal Domotic System to Support Autonomous Life of People with Cognitive Impairment. ICCHP (1) 2010: 324-331
2000 – 2009
- 2005
- [c2]Timothy Barbieri, Licia Sbattella, Antonio Bianchi, Ferdinando Carella, Marco Ferra:
Creating and Managing Electronic Content for Automatic Adaptation to the Reader's Profile: the Experience of Project MultiAbile for the Inclusion of Impaired e-Learners. ELPUB 2005 - 2004
- [c1]Thimoty Barbieri, Antonio Bianchi, Licia Sbattella:
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children. ICCHP 2004: 1054-1061
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint