Search

Your search keyword '"Giovanni Vigna"' showing total 200 results

Search Constraints

Start Over You searched for: Author "Giovanni Vigna" Remove constraint Author: "Giovanni Vigna" Language undetermined Remove constraint Language: undetermined
200 results on '"Giovanni Vigna"'

Search Results

1. Cholesterol efflux capacity is increased in subjects with familial hypercholesterolemia in a retrospective case–control study

2. Keeping Up with the Emotets: Tracking a Multi-Infrastructure Botnet

4. One Size Does Not Fit All

7. Sailfish: Vetting Smart Contract State-Inconsistency Bugs in Seconds

9. Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone

10. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning

11. Toward a secure crowdsourced location tracking system

12. Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses

13. Conware: Automated Modeling of Hardware Peripherals

14. TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems

15. Exploring Abstraction Functions in Fuzzing

16. KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware

17. SPIDER: Enabling Fast Patch Propagation In Related Software Repositories

18. Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web

19. On the Security of Application Installers and Online Software Repositories

20. Sleak

21. Mechanical Phish: Resilient Autonomous Hacking

22. Demystifying DDoS as a Service

23. The Analysis of Security

24. Scaling the Academic Security Community

25. Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis

26. Think Outside the Dataset

27. BootKeeper

28. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

29. BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation

31. Using Loops For Malware Classification Resilient to Feature-unaware Perturbations

32. Cloud Strife

33. Detecting Deceptive Reviews Using Generative Adversarial Networks

34. Measuring E-mail header injections on the world wide web

35. Broken Fingers: On the Usage of the Fingerprint API in Android

36. In rDNS We Trust: Revisiting a Common Data-Source’s Reliability

37. Erratum to: In rDNS We Trust: Revisiting a Common Data-Source’s Reliability

38. MineSweeper - An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense

39. Piston

40. Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information

41. Evaluating Cybersecurity Education Interventions: Three Case Studies

42. Portrait of a Privacy Invasion

43. Rise of the HaCRS

44. DIFUZE

45. POISED: Spotting Twitter Spam Off the Beaten Paths

46. How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games

47. Gossip

48. Ramblr: Making Reassembly Great Again

49. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

50. On the Workings and Current Practices of Web-Based Device Fingerprinting

Catalog

Books, media, physical & digital resources