Search

Your search keyword '"Giovanni Vigna"' showing total 186 results

Search Constraints

Start Over You searched for: Author "Giovanni Vigna" Remove constraint Author: "Giovanni Vigna" Topic computer science Remove constraint Topic: computer science
186 results on '"Giovanni Vigna"'

Search Results

1. One Size Does Not Fit All

2. Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone

3. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning

4. Toward a secure crowdsourced location tracking system

5. Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses

6. Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms

7. Conware: Automated Modeling of Hardware Peripherals

8. SYMBION

9. TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems

10. Exploring Abstraction Functions in Fuzzing

11. KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware

12. SPIDER: Enabling Fast Patch Propagation In Related Software Repositories

13. Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

14. Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web

15. When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features

16. On the Security of Application Installers and Online Software Repositories

17. Sleak

18. Mechanical Phish: Resilient Autonomous Hacking

19. Demystifying DDoS as a Service

20. Scaling the Academic Security Community

21. Neurlux: Dynamic Malware Analysis Without Feature Engineering

22. Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis

23. Think Outside the Dataset

24. BootKeeper

25. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

26. BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation

28. Using Loops For Malware Classification Resilient to Feature-unaware Perturbations

29. Cloud Strife

30. Detecting Deceptive Reviews Using Generative Adversarial Networks

31. Measuring E-mail header injections on the world wide web

32. GuardION:Practical mitigation of DMA-based rowhammer attacks on ARM

33. Broken Fingers: On the Usage of the Fingerprint API in Android

34. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

35. In rDNS We Trust: Revisiting a Common Data-Source’s Reliability

36. Erratum to: In rDNS We Trust: Revisiting a Common Data-Source’s Reliability

37. MineSweeper - An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense

38. Piston

39. Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information

40. Evaluating Cybersecurity Education Interventions: Three Case Studies

41. Portrait of a Privacy Invasion

42. Rise of the HaCRS

43. DIFUZE

44. POISED: Spotting Twitter Spam Off the Beaten Paths

45. How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games

46. Gossip

47. Ramblr: Making Reassembly Great Again

48. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

49. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis

50. On the Workings and Current Practices of Web-Based Device Fingerprinting

Catalog

Books, media, physical & digital resources