Luca Invernizzi
Luca Invernizzi
Research scientist @ Google
Email verificata su google.com - Home page
TitoloCitata daAnno
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1093-1110, 2017
3212017
You are what you include: large-scale evaluation of remote javascript inclusions
N Nikiforakis, L Invernizzi, A Kapravelos, S Van Acker, W Joosen, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2412012
EVILSEED: A Guided Approach to Finding Malicious Web Pages
L Invernizzi, UC Santa Barbara, S Benvenuti, M Cova, PM Comparetti, ...
IEEE Symposium on Security & Privacy 2012 (AT&T NYU CSAW best security …, 2012
1642012
What the app is that? deception and countermeasures in the android user interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
2015 IEEE Symposium on Security and Privacy, 931-948, 2015
1252015
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1022014
Baredroid: Large-scale analysis of android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 71-80, 2015
502015
Message In A Bottle: Sailing Past Censorship
L Invernizzi, C Kruegel, G Vigna
ACSAC'13, and in HotPETS12 (workshop), 2012
412012
Data breaches, phishing, or malware?: Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
372017
Ten years of ictf: The good, the bad, and the ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
2014 {USENIX} Summit on Gaming, Games, and Gamification in Security …, 2014
362014
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
27*2018
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
172015
Cloak of Visibility: Detecting When Machines Browse A Different Web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
Security and Privacy (SP), 2016 IEEE Symposium on, 2016
142016
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security
Y Shoshitaishvili, L Invernizzi, A Doupe, G Vigna
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1649-1656, 2014
132014
Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein, Data Breaches, Phishing, or Malware?: Understanding the Risks of …
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
112017
Geometric control for autonomous underwater vehicles: overcoming a thruster failure
M Andonian, D Cazzaro, L Invernizzi, M Chyba, S Grammatico
49th IEEE Conference on Decision and Control (CDC), 7051-7056, 2010
112010
Eyes of a human, eyes of a program: Leveraging different views of the web for analysis and detection
J Corbetta, L Invernizzi, C Kruegel, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 130-149, 2014
102014
Three years of the Right to be Forgotten
T Bertram, E Bursztein, S Caro, H Chao, R Chin, P Fleischer, ...
https://drive.google.com/file/d/1H4MKNwf5MgeztG7OnJRnl3ym3gIT3HUK/view, 2018
62018
Gossip: Automatically identifying malicious domains from mailing list discussions
C Huang, S Hao, L Invernizzi, J Liu, Y Fang, C Kruegel, G Vigna
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
62017
A geometric approach to trajectory design for an autonomous underwater vehicle: Surveying the bulbous bow of a ship
RN Smith, D Cazzaro, L Invernizzi, G Marani, SK Choi, M Chyba
Acta applicandae mathematicae 115 (2), 209-232, 2011
32011
Trajectory Design for Autonomous Underwater Vehicles for Basin Exploration
M Chyba, D Cazzaro, L Invernizzi, M Andonian
9 th International Conference on Computer and IT Applications in the …, 2010
22010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20