Jacopo Corbetta
Jacopo Corbetta
Verified email at - Homepage
Cited by
Cited by
Driller: Augmenting fuzzing through selective symbolic execution.
N Stephens, J Grosen, C Salls, A Dutcher, R Wang, J Corbetta, ...
NDSS 16 (2016), 1-16, 2016
What the app is that? Deception and countermeasures in the Android user interface
A Bianchi, J Corbetta, L Invernizzi, Y Fratantonio, C Kruegel, G Vigna
2015 IEEE Symposium on Security and Privacy, 931-948, 2015
Baredroid: Large-scale analysis of Android apps on real devices
S Mutti, Y Fratantonio, A Bianchi, L Invernizzi, J Corbetta, D Kirat, ...
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Ten years of iCTF: The good, the bad, and the ugly
G Vigna, K Borgolte, J Corbetta, A Doupe, Y Fratantonio, L Invernizzi, ...
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
Mechanical phish: Resilient autonomous hacking
Y Shoshitaishvili, A Bianchi, K Borgolte, A Cama, J Corbetta, F Disperati, ...
IEEE Security & Privacy 16 (2), 12-22, 2018
Eyes of a human, eyes of a program: Leveraging different views of the web for analysis and detection
J Corbetta, L Invernizzi, C Kruegel, G Vigna
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
Are We Using the Crypto We Want?: TLS Cipher-suite Negotiation and Its Discontents
J Corbetta
University of California, Santa Barbara, 2016
Inner-Eye: Appearance-based Detection of Computer Scams
J Corbetta, B Lazzerini, G Frosini, G Vigna, C Kruegel
Transparent and Efficient Instrumentation and Debugging of 32-bit Binaries
J Corbetta, A Pignotti
Sant'Anna School of Advanced Studies, 2010
Mechanical Phish: Resilient Autonomous Hacking
A Cama, J Corbetta, P Grosen, A Machiry, C Salls
The system can't perform the operation now. Try again later.
Articles 1–10