フォロー
Fabio Gritti
タイトル
引用先
引用先
When malware is packin'heat; limits of machine learning classifiers based on static analysis features
H Aghakhani, F Gritti, F Mecca, M Lindorfer, S Ortolani, D Balzarotti, ...
Network and Distributed System Security Symposium, 2020
1812020
Measuring and defeating anti-instrumentation-equipped malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
702017
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images
F Gritti, F Pagani, I Grishchenko, L Dresel, N Redini, C Kruegel, G Vigna
2022 IEEE Symposium on Security and Privacy (SP), 1082-1099, 2022
282022
Symbion: Interleaving symbolic with concrete execution
F Gritti, L Fontana, E Gustafson, F Pagani, A Continella, C Kruegel, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020
262020
Exploiting unfair advantages: Investigating opportunistic trading in the NFT market
P Bose, D Das, F Gritti, N Ruaro, C Kruegel, G Vigna
arXiv preprint arXiv:2310.06844, 2023
62023
Confusum contractum: Confused deputy vulnerabilities in ethereum smart contracts
F Gritti, N Ruaro, R McLaughlin, P Bose, D Das, I Grishchenko, C Kruegel, ...
32nd USENIX Security Symposium (USENIX Security 23), 1793-1810, 2023
62023
Not your type! Detecting storage collision vulnerabilities in ethereum smart contracts
N Ruaro, F Gritti, R McLaughlin, I Grishchenko, C Kruegel, G Vigna
Proc. Netw. Distrib. Syst. Secur. Symp, 1-17, 2024
52024
Priyanka Bose, Dipanjan Das, Ilya Grishchenko, Christopher Kruegel, and Giovanni Vigna. Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts
F Gritti, N Ruaro, R McLaughlin
32nd USENIX Security Symposium (USENIX Security 23), 1793-1810, 2023
52023
Hiding Pin's Artifacts to Defeat Evasive Malware
M Polino, A Continella, S Mariani, S D’Alessio, L Fontana, F Gritti, ...
Black Hat Europe 2017, 2017
12017
PinShield: a dynamic layer of protection against anti-instrumentation attacks
L FONTANA, F GRITTI
Politecnico di Milano, 2014
2014
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–10