Folgen
Davide Balzarotti
Davide Balzarotti
Professor, Eurecom
Bestätigte E-Mail-Adresse bei eurecom.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
All your contacts are belong to us: automated identity theft attacks on social networks
L Bilge, T Strufe, D Balzarotti, E Kirda
Proceedings of the 18th international conference on World wide web, 551-560, 2009
8272009
A {Large-scale} analysis of the security of embedded firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
23rd USENIX security symposium (USENIX Security 14), 95-110, 2014
6332014
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
6252015
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5762008
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 14 (2014), 1-16, 2014
4802014
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
4092012
Exposure: A passive dns analysis service to detect and report malicious domains
L Bilge, S Sen, D Balzarotti, E Kirda, C Kruegel
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-28, 2014
4052014
G-Free: defeating return-oriented programming through gadget-less binaries
K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda
Proceedings of the 26th annual computer security applications conference, 49-58, 2010
3902010
A view on current malware behaviors
U Bayer, I Habibi, D Balzarotti, E Kirda, C Kruegel
Proceedings of the 2nd USENIX conference on Large-scale exploits and …, 2009
3072009
Efficient detection of split personalities in malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2902010
Understanding linux malware
E Cozzi, M Graziano, Y Fratantonio, D Balzarotti
2018 IEEE symposium on security and privacy (SP), 161-175, 2018
2822018
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2822004
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti
NDSS, 2018
2792018
Can I opt out yet? GDPR and the global illusion of cookie control
I Sanchez-Rola, M Dell'Amico, P Kotzias, D Balzarotti, L Bilge, PA Vervier, ...
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
2682019
Accessminer: using system-centric models for malware protection
A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2632010
Abusing social networks for automated user profiling
M Balduzzi, C Platzer, T Holz, E Kirda, D Balzarotti, C Kruegel
Recent Advances in Intrusion Detection, 422-441, 2010
2502010
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
2332007
Reverse social engineering attacks in online social networks
D Irani, M Balduzzi, D Balzarotti, E Kirda, C Pu
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011
2312011
SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers
X Ugarte-Pedrero, D Balzarotti, I Santos, PG Bringas
2015 IEEE Symposium on Security and Privacy, 659-673, 2015
2112015
A quantitative study of accuracy in system call-based malware detection
D Canali, A Lanzi, D Balzarotti, C Kruegel, M Christodorescu, E Kirda
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1992012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20