495 results on '"Giovanni Vigna"'
Search Results
52. Toward the Analysis of Embedded Firmware through Automated Re-hosting.
53. When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
54. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
55. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security.
56. Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
57. Detecting Deceptive Reviews Using Generative Adversarial Networks.
58. GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
59. Peer to Peer Hate: Hate Speech Instigators and Their Targets.
60. Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
61. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense.
62. Measuring E-mail header injections on the world wide web.
63. In rDNS We Trust: Revisiting a Common Data-Source's Reliability.
64. DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers.
65. BootStomp: On the Security of Bootloaders in Mobile Devices.
66. Piston: Uncooperative Remote Runtime Patching.
67. Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
68. Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
69. Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
70. POISED: Spotting Twitter Spam Off the Beaten Paths.
71. DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
72. Something from Nothing (There): Collecting Global IPv6 Datasets from DNS.
73. How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
74. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
75. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis.
76. TriggerScope: Towards Detecting Logic Bombs in Android Applications.
77. Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
78. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
79. Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
80. Broken Fingers: On the Usage of the Fingerprint API in Android.
81. Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
82. Prison: Tracking Process Interactions to Contain Malware.
83. CLAPP: characterizing loops in Android applications.
84. EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services.
85. ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
86. Meerkat: Detecting Website Defacements through Image-based Object Recognition.
87. How the ELF Ruined Christmas.
88. What the App is That? Deception and Countermeasures in the Android User Interface.
89. On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.
90. Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
91. BareDroid: Large-Scale Analysis of Android Apps on Real Devices.
92. Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications.
93. Drops for Stuff: An Analysis of Reshipping Mule Scams.
94. NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android.
95. MalGene: Automatic Extraction of Malware Analysis Evasion Signature.
96. DEEPCASE
97. Keeping Up with the Emotets: Tracking a Multi-Infrastructure Botnet
98. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
99. Ramblr: Making Reassembly Great Again.
100. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.