Understanding linux malware E Cozzi, M Graziano, Y Fratantonio, D Balzarotti 2018 IEEE symposium on security and privacy (SP), 161-175, 2018 | 282 | 2018 |
Needles in a haystack: Mining information from public dynamic analysis sandboxes for malware intelligence M Graziano, D Canali, L Bilge, A Lanzi, E Shi, D Balzarotti, M van Dijk, ... 24th USENIX Security Symposium (USENIX Security 15), 1057-1072, 2015 | 101 | 2015 |
How machine learning is solving the binary function similarity problem A Marcelli, M Graziano, X Ugarte-Pedrero, Y Fratantonio, M Mansouri, ... 31st USENIX Security Symposium (USENIX Security 22), 2099-2116, 2022 | 99 | 2022 |
A close look at a daily dataset of malware samples X Ugarte-Pedrero, M Graziano, D Balzarotti ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-30, 2019 | 71 | 2019 |
Hypervisor memory forensics M Graziano, A Lanzi, D Balzarotti Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 70 | 2013 |
Survivalism: Systematic analysis of windows malware living-off-the-land F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic 2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021 | 53 | 2021 |
Towards Network Containment in Malware Analysis Systems M Graziano, C Leita, D Balzarotti | 40 | 2012 |
ROPMEMU: A framework for the analysis of complex code-reuse attacks M Graziano, D Balzarotti, A Zidouemba Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 39 | 2016 |
Micro-virtualization memory tracing to detect and prevent spraying attacks S Cristalli, M Pagnozzi, M Graziano, A Lanzi, D Balzarotti 25th {USENIX} Security Symposium ({USENIX} Security 16), 431-446, 2016 | 20 | 2016 |
Subverting operating system properties through evolutionary DKOM attacks M Graziano, L Flore, A Lanzi, D Balzarotti Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 19 | 2016 |
Lost in the loader: The many faces of the windows pe file format D Nisi, M Graziano, Y Fratantonio, D Balzarotti Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 13 | 2021 |
SnakeGX: a sneaky attack against SGX Enclaves F Toffalini, M Graziano, M Conti, J Zhou International Conference on Applied Cryptography and Network Security, 333-362, 2021 | 13 | 2021 |
Smashing the stack in 2010 M Graziano, A Cugliari no. July, 1-73, 2010 | 10* | 2010 |
Measuring the role of greylisting and nolisting in fighting spam F Pagani, M De Astis, M Graziano, A Lanzi, D Balzarotti 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 8 | 2016 |
Through the {Looking-Glass}, and What Eve Found There L Bruno, M Graziano, D Balzarotti, A Francillon 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 7 | 2014 |
The evidence beyond the wall: Memory forensics in SGX environments F Toffalini, A Oliveri, M Graziano, J Zhou, D Balzarotti Forensic Science International: Digital Investigation 39, 301313, 2021 | 4 | 2021 |
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino Proceedings of the 39th Annual Computer Security Applications Conference, 14-28, 2023 | 1 | 2023 |
Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns G Stivala, G De Stefano, A Mengascini, M Graziano, G Pellegrino 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 155-172, 2024 | | 2024 |
A Large-Scale Study of Phishing PDF Documents G Stivala, S Abdelnabi, A Mengascini, M Graziano, M Fritz, G Pellegrino arXiv e-prints, arXiv: 2308.01273, 2023 | | 2023 |
2024 IEEE 9th European Symposium on Security and Privacy (EuroS& P)| 979-8-3503-5425-6/24/$31.00© 2024 IEEE| DOI: 10.1109/EUROSP60621. 2024.00054 Y Aafer, E Ackermann, A Agarwal, M Aghvamipanah, MT Alam, ... | | |