Follow
Marco Cova
Marco Cova
Verified email at vmware.com - Homepage
Title
Cited by
Cited by
Year
Your botnet is my botnet: Analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9952009
Detection and analysis of drive-by-download attacks and malicious JavaScript code
M Cova, C Kruegel, G Vigna
Proceedings of the 19th international conference on World wide web, 281-290, 2010
9402010
Saner: Composing static and dynamic analysis to validate sanitization in web applications
D Balzarotti, M Cova, V Felmetsger, N Jovanovic, E Kirda, C Kruegel, ...
2008 IEEE Symposium on Security and Privacy (sp 2008), 387-401, 2008
5752008
Prophiler: A fast filter for the large-scale detection of malicious web pages
D Canali, M Cova, G Vigna, C Kruegel
Proceedings of the 20th international conference on World wide web, 197-206, 2011
5482011
Why Johnny can’t pentest: an analysis of black-box web vulnerability scanners
A Doupé, M Cova, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment, 111-131, 2010
4002010
Efficient Detection of Split Personalities in Malware.
D Balzarotti, M Cova, C Karlberger, E Kirda, C Kruegel, G Vigna
NDSS, 2010
2902010
EVILSEED: A Guided Approach to Finding Malicious Web Pages
L Invernizzi, S Benvenuti, M Cova, PM Comparetti, C Kruegel, G Vigna
IEEE Symposium on Security and Privacy, 2012
2682012
SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr
G Banks, M Cova, V Felmetsger, K Almeroth, R Kemmerer, G Vigna
International Conference on Information Security, 343-358, 2006
2592006
Swaddler: An approach for the anomaly-based detection of state violations in web applications
M Cova, D Balzarotti, V Felmetsger, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 63-86, 2007
2332007
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware
A Kapravelos, Y Shoshitaishvili, M Cova, C Kruegel, G Vigna
USENIX Security Symposium, 2013
2172013
Clearshot: Eavesdropping on keyboard input from video
D Balzarotti, M Cova, G Vigna
2008 IEEE Symposium on Security and Privacy (sp 2008), 170-183, 2008
1842008
Multi-module vulnerability analysis of web-based applications
D Balzarotti, M Cova, VV Felmetsger, G Vigna
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1622007
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits.
M Cova, C Kruegel, G Vigna
Workshop on Offensive Technologies (WOOT) 8, 1-8, 2008
1382008
Static detection of vulnerabilities in x86 executables
M Cova, V Felmetsger, G Banks, G Vigna
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 269-278, 2006
1362006
Analysis of a botnet takeover
B Stone-Gross, M Cova, B Gilbert, R Kemmerer, C Kruegel, G Vigna
IEEE Security & Privacy 9 (1), 64-72, 2011
1282011
Analyzing and detecting malicious Flash advertisements
S Ford, M Cova, C Kruegel, G Vigna
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 363-372, 2009
1262009
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
International SPIN Workshop on Model Checking of Software, 306-324, 2008
1122008
An analysis of rogue AV campaigns
M Cova, C Leita, O Thonnard, A Keromytis, M Dacier
Recent Advances in Intrusion Detection, 442-463, 2010
902010
An experience in testing the security of real-world electronic voting systems
D Balzarotti, G Banks, M Cova, V Felmetsger, R Kemmerer, W Robertson, ...
IEEE transactions on software engineering 36 (4), 453-473, 2010
842010
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events
T van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
802021
The system can't perform the operation now. Try again later.
Articles 1–20