252 results on '"Davide Balzarotti"'
Search Results
2. Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware.
3. Malware Research: History, Milestones, and Open Questions.
4. ModSec-Learn: Boosting ModSecurity with Machine Learning.
5. Humans vs. Machines in Malware Classification.
6. Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
7. WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate.
8. Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors.
9. Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
10. CrabSandwich: Fuzzing Rust with Rust (Registered Report).
11. Dissecting American Fuzzy Lop: A FuzzBench Evaluation.
12. A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments.
13. On the inadequacy of open-source application logs for digital forensics.
14. Fuzzing with Data Dependency Information.
15. RE-Mind: a First Look Inside the Mind of a Reverse Engineer.
16. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
17. How Machine Learning Is Solving the Binary Function Similarity Problem.
18. When Sally Met Trackers: Web Tracking From the Users' Perspective.
19. Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
20. LibAFL: A Framework to Build Modular and Reusable Fuzzers.
21. The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study.
22. An OS-agnostic Approach to Memory Forensics.
23. AutoProfile: Towards Automated Profile Generation for Memory Analysis.
24. In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics.
25. Adversarial ModSecurity: Countering Adversarial SQL Injections with Robust Machine Learning.
26. The Use of Likely Invariants as Feedback for Fuzzers.
27. When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World.
28. Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization.
29. Lost in the Loader: The Many Faces of the Windows PE File Format.
30. Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone.
31. SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
32. Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web.
33. SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap.
34. The Tangled Genealogy of IoT Malware.
35. Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications.
36. Certificate Transparency in Google Chrome: Past, Present, and Future.
37. Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques.
38. BakingTimer: privacy analysis of server-side request processing time.
39. Toward the Analysis of Embedded Firmware through Automated Re-hosting.
40. Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
41. Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing.
42. Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
43. Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
44. When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
45. Understanding Linux Malware.
46. Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.
47. Clock Around the Clock: Time-Based Device Fingerprinting.
48. A Close Look at a Daily Dataset of Malware Samples.
49. Introducing the Temporal Dimension to Memory Forensics.
50. Longitudinal Study of the Prevalence of Malware Evasive Techniques.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.